πΊ Watch my YouTube video bellow on how to disable Print Spooler on Domain Controllers π π
youtu.be/O80HHKdnbcQ
#cswlrd #printspooler #domaincontrollers #printnightmare #videotutorial
During a #redteam at @modzero.bsky.social we discovered a limited but neat bypass for #printnightmare. I talked to @itm4n about it and he had an indepth look. Read about it here:
itm4n.github.io/printnightma...
#itsec
Another Hypetweet FAIL
#CUPS vuln isnt exactly nothing. It's an rce vuln and is now exploitable. however it isnt #Printnightmare.
Im firmly of the opinion that one should either fully disclose or coordinate disclosure of vulnerabilities.
pick a lane
#Glassof0J #Infosec
youtu.be/WimG264WkXM
πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ ππππ«ππ¨π§Β (English) www.patreon.com/posts/how-to... πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ π π¨π«ππ§ππ¨π«π¬ (Czech) www.forendors.cz/p/39ff110621... πΊ πππππ‘ ππ‘π π«πππ¨π«ππ’π§π π¨π§ πππ«π¨π‘ππ«π¨ (Czech) herohero.co/cswrld/post/... πShare, like, comment! #video #tutorial #cswrld #printspooler #printnightmare
Do you have Print Spooler enabled on your Domain Controllers? Do you know that the #PrintNightmare critical vulnerability was related to the Print Spooler service? Disable it now. #tip #printspooler #cybersecurity www.cswrld.com/2023/12/how-...
Given all the issues with #PrintNightmare recently, Microsoft is changing the default behaviour of 'Point and Print' so that adding or updating drivers requires admin privileges.
More information:
#MVPBuzz #Security #Windows
@GossiTheDog absolutely on point with this comment after this months #PrintNightmare and #HiveNightmare clusterfucks
Primera entidad con #ransomware vΓa #printNightmare. Que comiencen los juegos del tΓ³ner
#PrintNightmare : le patch de Microsoft aurait un problèmevia @GNT
generation-nt.com/printnightmareβ¦
AquΓ tienes mucha info condensada de #printNightmare, junto con ideas de detecciΓ³n para IDS/SIEM:
#PrintNightmare update: Microsoft ha lanzado un boletin de seguridad en el que reconoce la vuln como nueva (CVE-2021-34527), y propone varias mitigaciones asΓ como parches: !Parchea/mitiga cuanto antes!
"Technical details and a proof-of-concept (PoC) #exploit have been accidentally leaked for a currently unpatched #vulnerability in #Windows that allows remote code execution." #ZeroDay #CyberSecurity #PrintNightmare