A paper examining the MS-NRPC protocol in detail and walk through how to exploit it.