ขนาดวิดีโอ: 1280 X 720853 X 480640 X 360
แสดงแผงควบคุมโปรแกรมเล่น
เล่นอัตโนมัติ
เล่นใหม่
Trust me, people will be WANTING to see what happens here, and considering you put a demo for it, I can bet that this will blow up, I hope it happens, and best of luck to you.
Is there any tool/script to check the print spooler service is running on domain controllers remotely?
i can't connect if victim doesn't use password
Where is the exploit code?
ok nice, but whats the default username and password for smb? or is it the creds you use to login to your pc?
Bro... You need creds to exploit this vuln, no exist defaults creds, but.. search about null sessions in SMB
patch is out now
Trust me, people will be WANTING to see what happens here, and considering you put a demo for it, I can bet that this will blow up, I hope it happens, and best of luck to you.
Is there any tool/script to check the print spooler service is running on domain controllers remotely?
i can't connect if victim doesn't use password
Where is the exploit code?
ok nice, but whats the default username and password for smb? or is it the creds you use to login to your pc?
Bro... You need creds to exploit this vuln, no exist defaults creds, but.. search about null sessions in SMB
patch is out now