Kernel Exploits

Recursos


HiveNightmare

https://github.com/GossiTheDog/HiveNightmarearrow-up-right

.\HiveNightmare.exe

Transferir los archivos SAM, SYSTEM y SECURITY a la máquina atacante

secretsdump.py -sam SAM-2021-08-07 -system SYSTEM-2021-08-07 -security SECURITY-2021-08-07 local

PrintNightmare

RpcAddPrinterDriverarrow-up-right

CVE-2021-1675arrow-up-right

CVE-2021-1675 - PrintNightmare LPE (PowerShell)arrow-up-right

Checking for Spooler Service

ls \\localhost\pipe\spoolss

Adding Local Admin with PrintNightmare PowerShell PoC

Confirming New Admin User


Enumerating Missing Patches

Examining Installed Updates

CVE-2020-0668

Checking Current User Privileges

Last updated