spooler
Last updated
Last updated
misc::spooler
is Mimikat's implementation of the MS-RPRN abuse (PrinterBug), an authentication coercion technique. It has the following command line arguments:
/authuser
: the User Principal Name (UPN). By default it uses the current user's token
/authpassword
: the password of the user
/noauth
: use null session
/endpoint
: the RPC endpoint. By default is uses \pipe\spoolss
/server
or /target
: the target server
/connect
or /callback
: the remote host the target should connect to (attacker host)
For more information on how to exploit this, see The Hacker Recipes. It can be used to NTLM relay attacks, NTLM capture, etc.