Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-1675 PoC — Microsoft Windows Print Spooler Components 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Print Spooler Components 安全漏洞 (CVE-2021-1675)
Description:Microsoft Windows Print Spooler Components是美国微软(Microsoft)公司的一个打印后台处理程序组件。 Microsoft Windows Print Spooler Components存在安全漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for AR
Readme
# PrintNightmareScanner
Scanner to detect Windows Print Spooler Remote Code Execution Vulnerability (CVE-2021-1675)

## Prerequisite's
- python3
- python3 -m pip install -r Requirements.txt

## Usage
python3 detectprintnightmare.py --help

```
usage: detectprintnightmare.py [-h] [-t TARGET] [-T TARGETS] [-c CIDR]

optional arguments:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Single IP
  -T TARGETS, --targets TARGETS
                        List of IP in text file
  -c CIDR, --cidr CIDR  CIDR range
```
## Example: 1
Run the script for single IP
```
python3 detectprintnightmare.py -t 192.168.0.1
```
![alt text](https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare/blob/main/Usage.png)

## Example: 2
Run the script for Multiple ips by providing text file with ips
```
python3 detectprintnightmare.py -T ips.txt
```
![alt text](https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare/blob/main/Example.png)
## Example: 3
Run the script for CIDR
```
python3 detectprintnightmare.py -c 192.168.0.1/24
```

## Reference
[PrintNightmare](https://github.com/afwu/PrintNightmare)


File Snapshot

[4.0K] /data/pocs/11e3ca121aed3cca15bd6d7844ddd9a116b32fd4 ├── [3.3K] detectprintnightmare.py ├── [ 27K] Example.png ├── [ 34K] LICENSE ├── [1.2K] README.md ├── [ 28] requirements.txt └── [9.1K] Usage.png 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.