Another blog post!
PrintSpoofer - Abusing SeImpersonate on Windows 10 and Server 2019
https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/ …
cc @jonasLykpic.twitter.com/VVIzLw06xA
Replying to @itm4n
A bit of info not mentioned- impersonation requires that you read like 4 bytes or something from the pipe before it is allowed. That can stop many other vulnerable scenarios. That is why we use UNC path- by having the service open \\computername that requirement is bypassed :)
12:38 PM - 2 May 2020
0 replies
0 retweets
11 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.