If an attacker controls a machine with unconstrained delegation, they could use the printer bug to coerce a domain controller to authenticate to their controlled machine and extract the domain controller’s computer account TGT. even between different domains.
The printer bug is a “feature” within the Windows Print System Remote Protocol (MS-RPRN) that allows a host to query another host, asking for an update on a print job. The target host then responds by authenticating to the host that initiated the request, via TGS (which contains a TGT in the case of unconstrained delegation).
What this means, is that if an attacker controls a machine with unconstrained delegation, they could use the printer bug to coerce a domain controller to authenticate to their controlled machine and extract the domain controller’s computer account TGT.
Step by step for Unconstrained Delegation + “The Printer Bug” :
If you compromise a computer configured for unconstrained delegation, you can compromise the entire domain (and forest!)
We can use a compromised domain controller to trigger a spool request to a different domain controller in a different domain (with bidirectional trust).
Step by step (See picture on the right):