8000 wmic printer list does not trigger the exploit · Issue #1 · RedSection/printjacker · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

wmic printer list does not trigger the exploit #1

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
AgentMisterious opened this issue Sep 17, 2024 · 0 comments
Open

wmic printer list does not trigger the exploit #1

AgentMisterious opened this issue Sep 17, 2024 · 0 comments

Comments

@AgentMisterious
Copy link

Okay so I might be just doing something wrong, or understanding the exploit incorrectly -
I am running Windows 10 22H2.
After compiling the tool and executing the binary with administratives privileges in -execute mode everything works as planned, but if I use the -hijack mode and then execute wmic printer list manually (using the same admin-level user), the shell doesn't get triggered.

Moreover, when using a file overwrite vuln to get write access on PrintConfig.dll, I replace the original DLL with the compiled one. If I use the tool with a low-privileged user after gaining write access to the file, I get an error saying the user doesn't own thd directory (which is fine, as the user only has write access on the DLL). Afterwards, I execute wmic, and once again, no result.

So question is - what does the .exe binary actually do other than overwriting the DLL and running wmic printer list?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant
0