Thanks, Heath! The part showing us how to check for it looks particularly handy. I get alerts every now and again at work, of potentially vulnerable machines, but it's always hard to know for sure if the patches and driver updates actually work after I reach out to the IT pros to address the alert. It will be nice to be able to actually check and let them know.
For some reason GPO printers won't deploy on one of my computers. When I gpresult /r I see it was correctly applied but Windows 11 still won't auto map the printer on my server. Does this have anything to do with Print Nightmare or am I doing something wrong?
Hi there... Unable to figure out the need for this share drive that we set on the kali... We used msfvenom to create the payload.. Metasploit for listening the connection... Now our aim is to execute this payload on the remote workstation that has print spooler service is enabled... Why did we need the help of a share drive in our attacker workstation and use impacket to use the victim to execute that dll file via the share hosted on our machine ...if we had somehow managed to deliver that payload to the victim, i guess the share drive n impacket step is not needed... Please enlighten me
I didn't know the printer had nightmares until I watched this video 😂👍
Thanks, Heath! The part showing us how to check for it looks particularly handy. I get alerts every now and again at work, of potentially vulnerable machines, but it's always hard to know for sure if the patches and driver updates actually work after I reach out to the IT pros to address the alert.
It will be nice to be able to actually check and let them know.
I wish the magic of editing would take away all the issues I run into when running PoC's in the lab. That'd be amazing.
For some reason GPO printers won't deploy on one of my computers. When I gpresult /r I see it was correctly applied but Windows 11 still won't auto map the printer on my server. Does this have anything to do with Print Nightmare or am I doing something wrong?
Hi there...
Unable to figure out the need for this share drive that we set on the kali...
We used msfvenom to create the payload..
Metasploit for listening the connection...
Now our aim is to execute this payload on the remote workstation that has print spooler service is enabled...
Why did we need the help of a share drive in our attacker workstation and use impacket to use the victim to execute that dll file via the share hosted on our machine ...if we had somehow managed to deliver that payload to the victim, i guess the share drive n impacket step is not needed...
Please enlighten me
Bonuspoints for the thumbnail
I love the shirt. Where can I get it? :)
Thanks!! Got it from Target :)
@@TCMSecurityAcademy don't think Target in Australia sells something that slick. Haha dang
You are the man
What do you do on working day?
Thanks for the video =)
Sir i want to know where i can learn about bypassing the antivirus?
Defender must be disabled? How you can do it if there is no domain controller? Also, Do this works on windows 7/Server 2012
?
Does anyone else has this issue that impacter and smbserver are using same port. and you can run only one at ones?
hi . please add cc to ethical hacking for beginners
please
that shirt is dope
Wicked
thx
Hmm, he is chubby than I thought 😂
So is your mom
Love from India awesome video❤️
Hi dad