PrintNightMare - CVE-2021-34527
Is Spooler active ?
# with cme
nxc smb $target_ip -M spooler
# with impacket
rpcdump.py @$target_ip | egrep 'MS-RPRN|MS-PAR'Prepare the exploit
Here is the DLL we will use, it creates an user and add it as local administrator βΊοΈ
Compile it :
Exploit it :
Last updated
Was this helpful?