Last updated
Was this helpful?
Last updated
Was this helpful?
This abuse can be carried out when controlling an object that has a GenericAll
, AllExtendedRights
or User-Force-Change-Password
over the target user.
It can also be achieved from UNIX-like system with , a tool for the administration of samba and cifs/smb clients. The can also be used to run net commands with .
The can also be used on UNIX-like systems when the package samba-common-bin
is missing.