Printspoofer PE(instantly become System!)
PrintSpoofer exploit that can be used to escalate service user permissions on Windows Server 2016, Server 2019, and Windows 10.
To escalate privileges, the service account must have SeImpersonate privileges.
Steps: 1. Transfer the exe to the victim, and run the command
Now we've got a rev shell with more privileges
Reading through the privileges we have now, it's confirmed that the SeImpersonatePrivilege
is missing but that can be retrieved by creating a ScheduledTaskPrincipal
where we can specify SeImpersonatePrivilege
in RequiredPrivilege
attribute.
SeImpersonatePrivilege is on now! Let's get into the system with printspoofer!
rooted!
Last updated