Exploit the PrintNightmare vulnerability using a custom driver DLL containing a CreateProcess call that launches a Pneuma
DLL as NT AUTHORITY/SYSTEM via rundll32.exe.
View Command
To view this TTPs command, you must be logged in with a professional or enterprise license.