PrintNightMare - CVE-2021-34527

Is Spooler active ?

# with cme
nxc smb $target_ip -M spooler

# with impacket
rpcdump.py @$target_ip | egrep 'MS-RPRN|MS-PAR'

Prepare the exploit

Here is the DLL we will use, it creates an user and add it as local administrator ☺️

Compile it :

Exploit it :

Last updated

Was this helpful?