printnightmare
Last updated
Last updated
misc::printnightmare
can be used to exploit the vulnerability in both [] and []. The bug was discovered by Zhiniang Peng () & Xuefeng Li (). The MS-PAR function was discovered by . It has the following command line arguments:
/server
: the target server or workstation to exploit
/x64
or /win64
: the target server or workstation is 64 bit
/x86
or /win32
: the target server or workstation is 32 bit
/library
: the DLL to use during exploitation
/authuser
: the username to use during exploitation
/authdomain
: the active directory domain
/authpassword
: the password of the user
/clean
: clean-up the operation
The following example demonstrates local privilege escalation through printnightmare. As can be seen, the test
user is not part of the local administrators group on the Win10.hacklab.local machine:
After successful exploitation of printnightmare:
The test user is now part of the local administrators group:
For remote exploitation, the following can be used:
With the :