Another blog post!
PrintSpoofer - Abusing SeImpersonate on Windows 10 and Server 2019
https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/ …
cc @jonasLykpic.twitter.com/VVIzLw06xA
-
-
I'm still looking at this piece of code and wondering WHY !?!? Nice trick :D tested also from app pool identity and work smoothly. Really good job to both of you!pic.twitter.com/ba78zqndfj
2 replies 1 retweet 4 likes -
why what?
1 reply 0 retweets 0 likes -
I was referring to the trick of using / in the pipe name to control the path used by the server . That “why” was just a sarcastic joke
1 reply 0 retweets 1 like
Well- I will try and answer anyway: I do weird shit, sometimes with surprising results- most often not, but sometimes. That is how I found lock screen bypass- coupled with an EOP and I created a bitlocker bypass. The right amount of weird can be a good thing :)
1:47 AM - 3 May 2020
0 replies
0 retweets
3 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.