Exploit PrintNightmare vulnerability to spawn elevated agent

/static/assets/windows-logo.svg
Exploit the PrintNightmare vulnerability using a custom driver DLL containing a CreateProcess call that launches a Pneuma DLL as NT AUTHORITY/SYSTEM via rundll32.exe.
locked
View Command

To view this TTPs command, you must be logged in with a professional or enterprise license.

Login

Test this TTP

Download Operator (1.7.1)
Test this TTP using one of our Operator chains
Printnightmare

2021-08-10

/static/assets/windows-logo.svg
Escalate local privileges and spawn a SYSTEM-level agent by exploiting CVE-2021-34527 (PrintNightmare).