đģ PrintNightmare
https://github.com/cube0x0/CVE-2021-1675
Identify
REG QUERY "HKLM\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint"
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint
RestrictDriverInstallationToAdministrators REG_DWORD 0x0
NoWarningNoElevationOnInstall REG_DWORD 0x1
Exploit
You need bros version of impacket
Generate DLL payload Host payload on smbserver Start listener, execute payload