{"id":21497,"date":"2021-09-28T00:34:00","date_gmt":"2021-09-27T22:34:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=21497"},"modified":"2021-09-27T15:47:55","modified_gmt":"2021-09-27T13:47:55","slug":"tipp-windows-printnightmare-testtools-fr-administratoren","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/09\/28\/tipp-windows-printnightmare-testtools-fr-administratoren\/","title":{"rendered":"Tip: Windows PrintNightmare test tools for administrators"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Windows\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=258064\" target=\"_blank\" rel=\"noopener\">German<\/a>]Administrators may be faced with the problem of testing their machine inventory to determine if individual installations are vulnerable to the PrintNightmare vulnerabilities in Windows. Furthermore, it may be necessary to remove or add printers. Someone did the work and implemented some test tools in Python. The whole thing was then released on Github.<\/p>\n<p><!--more--><\/p>\n<p>I did not look at the details, but became aware of this via the following <a href=\"https:\/\/twitter.com\/ollypwn\/status\/1442137236099768321\" target=\"_blank\" rel=\"noopener\">tweet<\/a>. So I am simply posting this as information here on the blog. The details can be found on <a href=\"https:\/\/github.com\/ollypwn\/PrintNightmare\" target=\"_blank\" rel=\"noopener\">GitHub<\/a> via the readme.&nbsp; <\/p>\n<p><a href=\"https:\/\/twitter.com\/ollypwn\/status\/1442137236099768321\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Windows PrintNightmare Testtools\" alt=\"Windows PrintNightmare Testtools\" src=\"https:\/\/i.imgur.com\/VZDG5h7.png\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Administrators may be faced with the problem of testing their machine inventory to determine if individual installations are vulnerable to the PrintNightmare vulnerabilities in Windows. Furthermore, it may be necessary to remove or add printers. Someone did the work and &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/09\/28\/tipp-windows-printnightmare-testtools-fr-administratoren\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[629,194],"class_list":["post-21497","post","type-post","status-publish","format-standard","hentry","category-windows","tag-tools","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=21497"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21497\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=21497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=21497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=21497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}