githubEdit

kernel-exploit 1

Windows vulnerabilities table

Microsoft Vulnerability Checkarrow-up-right


Hive-Nightmare - CVE-2021-36934 (HiveNightmarearrow-up-right)

.\HiveNightmare.exe

Transfer output files to the target host

impacket-secretsdump -sam SAM-2021-08-07 -system SYSTEM-2021-08-07 -security SECURITY-2021-08-07 local

PrintNightmare - CVE-2021-1675arrow-up-right/CVE-2021-34527

Affected windows 10 Build 10240, etc

Check for spooler service

ls \\localhost\pipe\spoolss #(path doesn't exist error)

Bypass execution policy

Set-ExecutionPolicy Bypass -Scope Process

Exploit

Import-module .\CVE-2021-1675.ps1

Confirm new user


This exploit need to be chained with another vulnerability, such as UsoDllLoaderarrow-up-right and diaghubarrow-up-right to load the DLL

Looking for third-party DLL (binary permission check)

Generate malicious binary

Exploit

Check permission of new file

Replace file with malicious binary

Start the service

Got reverse shell in MSFConsole

Last updated