Requirements
- domain user
- unpatched server (prior to 2019 and without backported KB)
Use msfvenom
to generate a reverse shell DLL. Use smbserver.py
(impacket) to host the DLL (make sure to pass -smb2support
flag).
Use the script below to exploit (username and password required; see example) GitHub - cube0x0/CVE-2021-1675: C# and Impacket implementation of PrintNightm…