Help - attempting to replicate CVE-2021-1675 print nightmare

This page summarizes the projects mentioned and recommended in the original post on /r/netsecstudents

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
  • CVE-2021-1675

    C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 (by cube0x0)

  • i Tried this (https://github.com/cube0x0/CVE-2021-1675) and its worked.

  • CVE-2021-1675

    Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • Metasploit

    Metasploit Framework

  • Is your system patched with June 8, 2021 security updates? If yes, there might be chances to get failed with with PoC. I found a metasploit module in github. Check if this helps. https://github.com/rapid7/metasploit-framework/pull/15385

  • WinPwn

    Automation for internal Windows Penetrationtest / AD-Security

  • mimikatz

    A little tool to play with Windows security

  • ItWasAllADream

    A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts