Hi I’m going through the Bleeding Edge Vulnerabilities in the AD Enumeration and Attacks Module. I’ve started the Target Machine and connected to the parrot attack box but I’m unable to get the printnightmare exploit working as the DC won’t connect to the smbshare on the attack box (ERROR_BAD_NETPATH - The network path was not found), I’ve done this exploit a few times before and had no issues but I wanted to check if we are meant to be able use this exploit for the questions at the end or not? Thanks
EDIT: Found Solution
Specify internal NICs IP address in smbserver command
sudo smbserver.py -smb2support new_share_name /path/to/share -ip 172.16.5.225
Hey! I could use a hint on this one. Keep getting the same error and I’m not sure how to interpret it. I use IP for the internal network and the credentials for user forend when running the exploit.
Like @TrentWalter mentioned SMB shares are only working on 172.16 network and not on 10.129. Wasted a whole day troubleshooting impacket and all the new versions.
Try taking out backupscript.dll from your “path”, your path should be the path to the folder where you keep the file.
sudo smbserver.py -smb2support CompData /home/htb-student/123/