The PrintNightmare vulnerability has to do with a flaw found in the Windows Print Spooler service. The flaw being that the service allows users to add printers and devices AND runs as system.
This is a Post-Compromised attack and only needs a regular user account
PrintNightmare Attack
Check if the Domain Controller is vulnerable
rpcdump.py@192.168.1.129|egrep'MS-RPRN|MS-PAR'
Desired Output
Protocol: [MS-PAR]: Print System Asynchronous Remote Protocol Protocol: [MS-RPRN]: Print System Remote Protocol
Generate malicious DLL, host it and start listener