Another blog post!
PrintSpoofer - Abusing SeImpersonate on Windows 10 and Server 2019
https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/ …
cc @jonasLykpic.twitter.com/VVIzLw06xA
-
-
I was referring to the trick of using / in the pipe name to control the path used by the server . That “why” was just a sarcastic joke
-
Well- I will try and answer anyway: I do weird shit, sometimes with surprising results- most often not, but sometimes. That is how I found lock screen bypass- coupled with an EOP and I created a bitlocker bypass. The right amount of weird can be a good thing :)
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.