Working PowerShell POC# CVE-2021-1675-PrintNightmare
Working PowerShell POC
Powershell script is copied from https://github.com/calebstewart/CVE-2021-1675
Respect for Caleb Stewart and John Hammond.
I just wanted to have working poc close at hand. Ive added my custom DLL and an obfuscated version of powershell script.
Obfuscated script loads DLL named "printed.dll" from "C:\windows\tracing" directory.
[4.0K] /data/pocs/13915b6c5971ec2365b69563b36649a03d364090
├── [4.0K] MyDLL2
│ ├── [ 421] MyDLL2.cpp
│ ├── [ 617] MyDLL2.h
│ ├── [6.9K] MyDLL2.vcxproj
│ ├── [1.0K] MyDLL2.vcxproj.filters
│ ├── [174K] printer_clean.ps1
│ └── [171K] printer_obf.ps1
├── [1.4K] MyDLL2.sln
└── [ 390] README.md
1 directory, 8 files