# PrintNightmareScanner
Scanner to detect Windows Print Spooler Remote Code Execution Vulnerability (CVE-2021-1675)
## Prerequisite's
- python3
- python3 -m pip install -r Requirements.txt
## Usage
python3 detectprintnightmare.py --help
```
usage: detectprintnightmare.py [-h] [-t TARGET] [-T TARGETS] [-c CIDR]
optional arguments:
-h, --help show this help message and exit
-t TARGET, --target TARGET
Single IP
-T TARGETS, --targets TARGETS
List of IP in text file
-c CIDR, --cidr CIDR CIDR range
```
## Example: 1
Run the script for single IP
```
python3 detectprintnightmare.py -t 192.168.0.1
```

## Example: 2
Run the script for Multiple ips by providing text file with ips
```
python3 detectprintnightmare.py -T ips.txt
```

## Example: 3
Run the script for CIDR
```
python3 detectprintnightmare.py -c 192.168.0.1/24
```
## Reference
[PrintNightmare](https://github.com/afwu/PrintNightmare)
[4.0K] /data/pocs/11e3ca121aed3cca15bd6d7844ddd9a116b32fd4
├── [3.3K] detectprintnightmare.py
├── [ 27K] Example.png
├── [ 34K] LICENSE
├── [1.2K] README.md
├── [ 28] requirements.txt
└── [9.1K] Usage.png
0 directories, 6 files