Print Nightmare AKA Domain Controller Domination

Поділитися
Вставка
  • Опубліковано 30 лис 2024

КОМЕНТАРІ • 23

  • @b391i
    @b391i 3 роки тому +10

    I didn't know the printer had nightmares until I watched this video 😂👍

  • @aaronwhite1786
    @aaronwhite1786 3 роки тому +1

    Thanks, Heath! The part showing us how to check for it looks particularly handy. I get alerts every now and again at work, of potentially vulnerable machines, but it's always hard to know for sure if the patches and driver updates actually work after I reach out to the IT pros to address the alert.
    It will be nice to be able to actually check and let them know.

  • @StudioSec
    @StudioSec 3 роки тому +7

    I wish the magic of editing would take away all the issues I run into when running PoC's in the lab. That'd be amazing.

  • @aolish
    @aolish 6 місяців тому

    For some reason GPO printers won't deploy on one of my computers. When I gpresult /r I see it was correctly applied but Windows 11 still won't auto map the printer on my server. Does this have anything to do with Print Nightmare or am I doing something wrong?

  • @ian230187
    @ian230187 3 роки тому

    Hi there...
    Unable to figure out the need for this share drive that we set on the kali...
    We used msfvenom to create the payload..
    Metasploit for listening the connection...
    Now our aim is to execute this payload on the remote workstation that has print spooler service is enabled...
    Why did we need the help of a share drive in our attacker workstation and use impacket to use the victim to execute that dll file via the share hosted on our machine ...if we had somehow managed to deliver that payload to the victim, i guess the share drive n impacket step is not needed...
    Please enlighten me

  • @frederikhossens5235
    @frederikhossens5235 3 роки тому

    Bonuspoints for the thumbnail

  • @natebrks
    @natebrks 3 роки тому +3

    I love the shirt. Where can I get it? :)

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  3 роки тому

      Thanks!! Got it from Target :)

    • @natebrks
      @natebrks 3 роки тому

      @@TCMSecurityAcademy don't think Target in Australia sells something that slick. Haha dang

  • @Matheus-lk9lh
    @Matheus-lk9lh 3 роки тому

    You are the man

  • @non66689
    @non66689 3 роки тому

    What do you do on working day?

  • @OthmanAlikhan
    @OthmanAlikhan 3 роки тому

    Thanks for the video =)

  • @tanmoygoswami927
    @tanmoygoswami927 3 роки тому

    Sir i want to know where i can learn about bypassing the antivirus?

  • @fercordovam
    @fercordovam 3 роки тому

    Defender must be disabled? How you can do it if there is no domain controller? Also, Do this works on windows 7/Server 2012
    ?

  • @robertolav
    @robertolav 3 роки тому

    Does anyone else has this issue that impacter and smbserver are using same port. and you can run only one at ones?

  • @nadirsensoy1684
    @nadirsensoy1684 3 роки тому +1

    hi . please add cc to ethical hacking for beginners
    please

  • @pentestical
    @pentestical 3 роки тому +1

    that shirt is dope

  • @TecraTube
    @TecraTube 3 роки тому

    Wicked

  • @ryanmccain1158
    @ryanmccain1158 3 роки тому

    thx

  • @SumanRoy.official
    @SumanRoy.official 3 роки тому +1

    Hmm, he is chubby than I thought 😂

  • @daljeetbhati8816
    @daljeetbhati8816 3 роки тому

    Love from India awesome video❤️

  • @dadquestionmark
    @dadquestionmark 3 роки тому +2

    Hi dad