Our great sponsors
-
CVE-2021-1675
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 (by cube0x0)
-
CVE-2021-1675
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
ItWasAllADream
A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE
i Tried this (https://github.com/cube0x0/CVE-2021-1675) and its worked.
Is your system patched with June 8, 2021 security updates? If yes, there might be chances to get failed with with PoC. I found a metasploit module in github. Check if this helps. https://github.com/rapid7/metasploit-framework/pull/15385
Related posts
- The 36 tools that SaaS can use to keep their product and data safe from criminal hackers (manual research)
- Pentesting Tools I Use Everyday
- How attackers use exposed Prometheus server to exploit Kubernetes clusters
- HowTo bare-metal install Proxmox Virtual Environment (PVE) - possibly the best hypervisor for most people and companies
- Awesome Penetration Testing