Printer Bug
What is it
The printer bug is a "feature" of the MS-RPRN protocol (PrintSystem Remote Protocol), which allows a domain user to remotely force a target host running the Print Spooler service to authenticate to an arbitrary IP address. There have been a few of these bugs in recent years: Spooler, PetitPotam, PrintNightmare. Microsoft claims that the only bug is that some of these did not require AD credentials at all, but this issue has been resolved through security patches.
Therefore, to exploit this, apart from machine account administrative privileges, we also need to meet the following four conditions :
A valid set of AD account credentials.
Network connectivity to the target's SMB service.
The target host must be running the Print Spooler service.
The hosts must not have SMB signing enforced.
Check requirements
In Powershell
GWMI Win32_Printer -Computer thmserver2.za.tryhackme.loc
See if Print Spooler service is running orGet-PrinterPort -ComputerName thmserver2.za.tryhackme.loc
Attack
Resources
Last updated