You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Target must be Windows 11 22H2+ or Server 2025 (RPC over TCP default)
For older versions, spoolss uses RPC over Named Pipes (SMB)
Ensure ports 135 and dynamic RPC ports (49152-65535) are open
Start Responder or ntlmrelayx on attacker_host to capture auth
Kerberos fails in this case due to a bad SPN from the spooler, forcing NTLM fallback.
Find the target spooler’s RPC/TCP port by querying the target Endpoint Mapper (EPM) on TCP/135 for the interface UUID 12345678-1234-abcd-ef00-0123456789ab. You can use rpcdump.py, PortQry, or any tool you prefer - or just implement the EPM lookup directly in this code ;)