Print Nightmare
Add a new user to the local administrators group by default:
Import-Module .\cve-2021-34527.ps1
Invoke-Nightmare # add user `adm1n`/`P@ssw0rd` in the local admin group by default
Invoke-Nightmare -DriverName "Xerox" -NewUser "john" -NewPassword "SuperSecure" Supply a custom DLL payload, to do anything else you might like.
Details
The LPE technique does not need to work with remote RPC or SMB, as it is only working with the functions of Print Spooler.
This script embeds a Base64-encoded GZIPped payload for a custom DLL, that is patched according to your arguments, to easily add a new user to the local administrators group.
This script embeds methods from PowerSploit/PowerUp to reflectively access the Win32 APIs.
This method does not loop through all printer drivers to find the appropriate DLL path -- it simply grabs the first driver and determines the appropriate path.
Last updated