#printnightmare β Public Fediverse posts
Live and recent posts from across the Fediverse tagged #printnightmare, aggregated by home.social.
-
πππ ππ πππππππ πππππ πππππππ ππ ππππππ πππππππππππ
Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.
Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.
The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.
But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itβs a good idea to disable Print Spooler on domain controllers.
πΊ Watch my YouTube video bellow on how to disable Print Spooler on Domain Controllers π π
https://youtu.be/O80HHKdnbcQ#cswlrd #printspooler #domaincontrollers #printnightmare #videotutorial
-
πππ ππ πππππππ πππππ πππππππ ππ ππππππ πππππππππππ
Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.
Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.
The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.
But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itβs a good idea to disable Print Spooler on domain controllers.
πΊ Watch my YouTube video bellow on how to disable Print Spooler on Domain Controllers π π
https://youtu.be/O80HHKdnbcQ#cswlrd #printspooler #domaincontrollers #printnightmare #videotutorial
-
πππ ππ πππππππ πππππ πππππππ ππ ππππππ πππππππππππ
Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.
Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.
The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.
But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itβs a good idea to disable Print Spooler on domain controllers.
πΊ Watch my YouTube video bellow on how to disable Print Spooler on Domain Controllers π π
https://youtu.be/O80HHKdnbcQ#cswlrd #printspooler #domaincontrollers #printnightmare #videotutorial
-
πππ ππ πππππππ πππππ πππππππ ππ ππππππ πππππππππππ
Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.
Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.
The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.
But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itβs a good idea to disable Print Spooler on domain controllers.
πΊ Watch my YouTube video bellow on how to disable Print Spooler on Domain Controllers π π
https://youtu.be/O80HHKdnbcQ#cswlrd #printspooler #domaincontrollers #printnightmare #videotutorial
-
π New blog post! "The PrintNightmare is not Over Yet"
βΉοΈ In this article, I take a look back at a previous post I wrote earlier this year about PrintNightmare. It turns out the Point and Print configuration I recommended at the end is still prone to Man-in-the-Middle attacks. So, I discuss that here, as well as additional mitigation I considered.
Props to @parzel and @l4x4 who both reported this issue to me.
-
π New blog post! "The PrintNightmare is not Over Yet"
βΉοΈ In this article, I take a look back at a previous post I wrote earlier this year about PrintNightmare. It turns out the Point and Print configuration I recommended at the end is still prone to Man-in-the-Middle attacks. So, I discuss that here, as well as additional mitigation I considered.
Props to @parzel and @l4x4 who both reported this issue to me.
-
π New blog post! "The PrintNightmare is not Over Yet"
βΉοΈ In this article, I take a look back at a previous post I wrote earlier this year about PrintNightmare. It turns out the Point and Print configuration I recommended at the end is still prone to Man-in-the-Middle attacks. So, I discuss that here, as well as additional mitigation I considered.
Props to @parzel and @l4x4 who both reported this issue to me.
-
π New blog post! "The PrintNightmare is not Over Yet"
βΉοΈ In this article, I take a look back at a previous post I wrote earlier this year about PrintNightmare. It turns out the Point and Print configuration I recommended at the end is still prone to Man-in-the-Middle attacks. So, I discuss that here, as well as additional mitigation I considered.
Props to @parzel and @l4x4 who both reported this issue to me.
-
π New blog post! "The PrintNightmare is not Over Yet"
βΉοΈ In this article, I take a look back at a previous post I wrote earlier this year about PrintNightmare. It turns out the Point and Print configuration I recommended at the end is still prone to Man-in-the-Middle attacks. So, I discuss that here, as well as additional mitigation I considered.
Props to @parzel and @l4x4 who both reported this issue to me.
-
Another Hypetweet FAIL
#CUPS vuln isnt exactly nothing. It's an rce vulnerability and is now exploitable. however it isnt #Printnightmare.
Im firmly of the opinion that one should either fully disclose or coordinate disclosure of vulnerabilities.
anything else just panics people, harms our ability to respond to real threats, and distracts from things that really matter.
pick a lane.
-
Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.
Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.
The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.
But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itβs a good idea to disable Print Spooler on domain controllers.
πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ ππππ«ππ¨π§ (English)
https://www.patreon.com/posts/how-to-disable-106780220?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_linkπΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ π π¨π«ππ§ππ¨π«π¬ (Czech)
https://www.forendors.cz/p/39ff110621ce2c644f22b4208dbd07d4πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ πππ«π¨π‘ππ«π¨ (Czech)
https://herohero.co/cswrld/post/bceroxowdykkdetywahfshfeacaπShare, like, comment!
-
Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.
Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.
The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.
But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itβs a good idea to disable Print Spooler on domain controllers.
πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ ππππ«ππ¨π§ (English)
https://www.patreon.com/posts/how-to-disable-106780220?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_linkπΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ π π¨π«ππ§ππ¨π«π¬ (Czech)
https://www.forendors.cz/p/39ff110621ce2c644f22b4208dbd07d4πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ πππ«π¨π‘ππ«π¨ (Czech)
https://herohero.co/cswrld/post/bceroxowdykkdetywahfshfeacaπShare, like, comment!
-
Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.
Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.
The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.
But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itβs a good idea to disable Print Spooler on domain controllers.
πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ ππππ«ππ¨π§ (English)
https://www.patreon.com/posts/how-to-disable-106780220?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_linkπΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ π π¨π«ππ§ππ¨π«π¬ (Czech)
https://www.forendors.cz/p/39ff110621ce2c644f22b4208dbd07d4πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ πππ«π¨π‘ππ«π¨ (Czech)
https://herohero.co/cswrld/post/bceroxowdykkdetywahfshfeacaπShare, like, comment!
-
Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.
Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.
The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.
But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itβs a good idea to disable Print Spooler on domain controllers.
πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ ππππ«ππ¨π§ (English)
https://www.patreon.com/posts/how-to-disable-106780220?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_linkπΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ π π¨π«ππ§ππ¨π«π¬ (Czech)
https://www.forendors.cz/p/39ff110621ce2c644f22b4208dbd07d4πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ πππ«π¨π‘ππ«π¨ (Czech)
https://herohero.co/cswrld/post/bceroxowdykkdetywahfshfeacaπShare, like, comment!
-
Happy Monday everyone!
I am sifting through the Cisco Talos Intelligence Group "Year In Review" report that was recently published and highlighting some of the things that I found useful/interesting from my perspective.
Top Targeted Vulnerabilities:
7/10 of the top CVE's belonged to #Microsoft. Now I am not pointing fingers, I think it is there simply because the vast majority of environments are Windows.
What IS concerning is that there are multiple vulnerabilities that were being exploited that were either 10 years old or ALMOST 10 years old.
8/10 of the top CVE's had a score of 9 or above.One of these CVE's was CVE-2021-1675, which is a remote code execution vulnerability that exists when the Windows Print Spooler service improperly performs privileged file operations. One product of this vulnerability was the #PrintNightmare exploit that was leveraged by the #Magniber ransomware group.
Stay tuned for more as we work our way through this report! Enjoy and Happy Hunting!
https://blog.talosintelligence.com/talos-year-in-review-2022/
-
Do you have Print Spooler enabled on your Domain Controllers? Do you know that the PrintNightmare critical vulnerability was related to the Print Spooler service?
Print Spooler should be disabled on Domain Controllers completely. You can easily disable it via GPO. #cybersecurity #tip #ad #dc #printspooler #printnightmare https://www.cswrld.com/2023/12/how-to-disable-print-spooler-on-domain-controllers/
-
Do you have Print Spooler enabled on your Domain Controllers? Do you know that the PrintNightmare critical vulnerability was related to the Print Spooler service?
Print Spooler should be disabled on Domain Controllers completely. You can easily disable it via GPO. #cybersecurity #tip #ad #dc #printspooler #printnightmare https://www.cswrld.com/2023/12/how-to-disable-print-spooler-on-domain-controllers/
-
Do you have Print Spooler enabled on your Domain Controllers? Do you know that the PrintNightmare critical vulnerability was related to the Print Spooler service?
Print Spooler should be disabled on Domain Controllers completely. You can easily disable it via GPO. #cybersecurity #tip #ad #dc #printspooler #printnightmare https://www.cswrld.com/2023/12/how-to-disable-print-spooler-on-domain-controllers/
-
Do you have Print Spooler enabled on your Domain Controllers? Do you know that the PrintNightmare critical vulnerability was related to the Print Spooler service?
Print Spooler should be disabled on Domain Controllers completely. You can easily disable it via GPO. #cybersecurity #tip #ad #dc #printspooler #printnightmare https://www.cswrld.com/2023/12/how-to-disable-print-spooler-on-domain-controllers/
-
Do you have Print Spooler enabled on your Domain Controllers? Do you know that the PrintNightmare critical vulnerability was related to the Print Spooler service?
Print Spooler should be disabled on Domain Controllers completely. You can easily disable it via GPO. #cybersecurity #tip #ad #dc #printspooler #printnightmare https://www.cswrld.com/2023/12/how-to-disable-print-spooler-on-domain-controllers/
-
Ich habe einen Hacker-Spickzettel geschrieben, den ich bei CTFs oder Pentests benutze: https://www.1337.observer
Neben kleineren Tricks, wie verschiedene Hackingtools verwendet werden, sind dort auch Anleitungen zu aktuellen, kritischen SicherheitslΓΌcken mit drin, wie #Log4Shell (Java), #PrintNightmare (Windows) oder #PwnKit (Linux).
Die Datei ist natΓΌrlich noch am Anfang. Vielleicht hilft das ja noch jemanden auΓer mir.
-
Seit Anfang September haben Angreifer eine Windows-LΓΌcke im Visier. Nun gibt es Sicherheitsupdates. Auch PrintNightmare spielt am Patchday nochmal eine Rolle.
Patchday: Microsoft schlieΓt von Angreifern ausgenutzte LΓΌcke in Windows -
Great #patchtuesday Microsoft, but did you not forgot something for #printnightmare? π€
Still SYSTEM from standard user...
(I may have missed something, but #mimikatzπ₯mimispool library still loads... π€·ββοΈ)
π¦π: https://twitter.com/gentilkiwi/status/1425154484167188480
-
Microsoft Patch Tuesday, July 2021 Edition https://krebsonsecurity.com/2021/07/microsoft-patch-tuesday-july-2021-edition/ #MicrosoftPatchTuesdayJuly2021 #ChadMcNaughton #CVE-2021-31979 #CVE-2021-33771 #CVE-2021-34448 #CVE-2021-34458 #CVE-2021-34473 #CVE-2021-34494 #CVE-2021-34523 #CVE-2021-34527 #PrintNightmare #Windowsupdates #SecurityTools #SatnamNarang #TimetoPatch #Automox #Tenable
-
π¬PrintNightmare RCE: Microsofts Notfallpatch behebt SicherheitslΓΌcke nicht vollstΓ€ndigπ¬ https://tarnkappe.info/printnightmare-rce-microsofts-notfallpatch-behebt-sicherheitsluecke-nicht-vollstaendig/ #BenjaminDelphy #PrintNightmare #gentilkiwi #Microsoft #Mimikatz #Security #Hacking
-
Angreifer kΓΆnnten viele Windows-Versionen attackieren und kompromittieren. Bislang gibt es keinen Patch. Admins mΓΌssen Systeme mit einem Workaround absichern. PrintNightmare: Schadcode-LΓΌcke in Windows bedroht ganze Netzwerke