CVE-2021-1675 PrintNightmare - Windows Print Spooler Exploit Demonstration
Nowcomm's SOC Team demonstrates how quick and easy it is for hackers to exploit Windows Print Spooler vulnerability with a little bit of computer knowledge.
A second vulnerability has been found in the Microsoft Print Spooler service, this is not yet patched by Microsoft and is in addition to the 'PrintNightmare' exploit discovered in June 2021. An update is expected this month.
WHAT TO DO? It is highly recommend disabling the print spooler service on windows servers and endpoints until a fix is released from Microsoft.
#PrintNightmare #PrintSpooler
For advice on how to defend your organisation against these types of attacks contact Nowcomm at:
hello@nowcomm.com
0300 3031200
nowcomm.com
----
// SUBSCRIBE
Subscribe to Nowcomm's channel for the latest trends, news and tips for Collaboration, Networks and Cyber Security!
// FOLLOW
Twitter: https://twitter.com/nowcomm
LinkedIn: https://www.linkedin.com/company/nowcomm
Facebook: https://en-gb.facebook.com/nowcomm/
// LET'S TALK!
Email: hello@nowcomm.com
Phone number: 0300 3031200
Website: nowcomm.com
// ABOUT NOWCOMM
We’re an elite team of technology experts in the design, delivery and customer service of Cisco solutions.
Our focus is high quality services and support, specialising in Enterprise Network Infrastructure, Collaboration and Security.
We are one of only a handful Cisco Partners in the UK to hold both Cisco Gold Partner and Master Collaboration status.
Видео CVE-2021-1675 PrintNightmare - Windows Print Spooler Exploit Demonstration канала Nowcomm
A second vulnerability has been found in the Microsoft Print Spooler service, this is not yet patched by Microsoft and is in addition to the 'PrintNightmare' exploit discovered in June 2021. An update is expected this month.
WHAT TO DO? It is highly recommend disabling the print spooler service on windows servers and endpoints until a fix is released from Microsoft.
#PrintNightmare #PrintSpooler
For advice on how to defend your organisation against these types of attacks contact Nowcomm at:
hello@nowcomm.com
0300 3031200
nowcomm.com
----
// SUBSCRIBE
Subscribe to Nowcomm's channel for the latest trends, news and tips for Collaboration, Networks and Cyber Security!
// FOLLOW
Twitter: https://twitter.com/nowcomm
LinkedIn: https://www.linkedin.com/company/nowcomm
Facebook: https://en-gb.facebook.com/nowcomm/
// LET'S TALK!
Email: hello@nowcomm.com
Phone number: 0300 3031200
Website: nowcomm.com
// ABOUT NOWCOMM
We’re an elite team of technology experts in the design, delivery and customer service of Cisco solutions.
Our focus is high quality services and support, specialising in Enterprise Network Infrastructure, Collaboration and Security.
We are one of only a handful Cisco Partners in the UK to hold both Cisco Gold Partner and Master Collaboration status.
Видео CVE-2021-1675 PrintNightmare - Windows Print Spooler Exploit Demonstration канала Nowcomm
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Windows CVE-2021–1675 #PrintNightmare Explained](https://i.ytimg.com/vi/LziYQlzOhck/default.jpg)
![let’s play with a ZERO-DAY vulnerability “follina”](https://i.ytimg.com/vi/3ytqP1QvhUc/default.jpg)
![SpoolFool - Windows Print Spooler Elevation of Privilege Vulnerability (CVE-2022–22718)](https://i.ytimg.com/vi/sIfFog0PN_o/default.jpg)
![PrintNightmare (CVE-2021-34527/CVE-2021-1675): New Zero Day Exploit Using The Windows Print Spooler](https://i.ytimg.com/vi/Ofu3qYvmT4Q/default.jpg)
![Minecraft hacking with PYTHON and Log4j // Netcat reverse shell exploiting CVE](https://i.ytimg.com/vi/efnluUK_w_U/default.jpg)
![PrintNightmare Exploit Demo](https://i.ytimg.com/vi/mhcil49-QJk/default.jpg)
![CVE-2021-34527 - PrintNightmare - Server 2016 PoC Demonstration](https://i.ytimg.com/vi/qU3vQ-B-FPY/default.jpg)
![Windows Update Finally Fixes PrintNightmare Vulnerability on Windows 10](https://i.ytimg.com/vi/KGAK5OLlB8U/default.jpg)
![Nmap Tutorial to find Network Vulnerabilities](https://i.ytimg.com/vi/4t4kBkMsDbQ/default.jpg)
![Spooling and Print Spooler: This is how it works (03)](https://i.ytimg.com/vi/maVpWuFGvQw/default.jpg)
![Man-In-The-Middle Attack Demo | Part 1](https://i.ytimg.com/vi/HdJNWOL6Pyo/default.jpg)
![How to Exploit a CVE?| Remote Code Execution CVE | WordPress RCE CVE: 2020-12800 Example Explained🔥](https://i.ytimg.com/vi/EcyWvytcN0E/default.jpg)
![Find Network Vulnerabilities with Nmap Scripts [Tutorial]](https://i.ytimg.com/vi/3U1pJ-eJrAU/default.jpg)
![Troubleshooting Printer Problems - CompTIA A+ 220-702: 1.5](https://i.ytimg.com/vi/6RDcyNC7y9Q/default.jpg)
![How I Would Learn To Code (If I Could Start Over)](https://i.ytimg.com/vi/k9WqpQp8VSU/default.jpg)
![CVE-2021-34527 - PrintNightmare - PoC with Print Spooler Connection GPO Applied](https://i.ytimg.com/vi/Vr6nV5GaY4o/default.jpg)
![New Windows 10 Vulnerability Allows Anyone to get Admin Privileges](https://i.ytimg.com/vi/AU_g4wzOZEM/default.jpg)
![i created malware with Python (it's SCARY easy!!)](https://i.ytimg.com/vi/UtMMjXOlRQc/default.jpg)
![Kiosk BREAKOUT - Web Browser to Command Prompt (Easy Mode)](https://i.ytimg.com/vi/R7srpHUshuI/default.jpg)
![5 Router Settings You Should Change Now!](https://i.ytimg.com/vi/mJnIgjyjEtc/default.jpg)