Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/SecuraBV/CVE-2020-1472
Test tool for CVE-2020-1472
https://github.com/SecuraBV/CVE-2020-1472
Last synced: 22 days ago
JSON representation
Test tool for CVE-2020-1472
- Host: GitHub
- URL: https://github.com/SecuraBV/CVE-2020-1472
- Owner: SecuraBV
- License: mit
- Created: 2020-09-08T08:58:37.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2023-07-20T10:51:42.000Z (over 1 year ago)
- Last Synced: 2024-05-08T01:32:45.928Z (7 months ago)
- Language: Python
- Homepage:
- Size: 15.6 KB
- Stars: 1,689
- Watchers: 87
- Forks: 362
- Open Issues: 9
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - SecuraBV/CVE-2020-1472 - Test tool for CVE-2020-1472 (Python)
README
# ZeroLogon testing script
A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit (CVE-2020-1472).
It attempts to perform the Netlogon authentication bypass. The script will immediately terminate when successfully
performing the bypass, and not perform any Netlogon operations. When a domain controller is patched, the detection
script will give up after sending 2000 pairs of RPC calls and conclude the target is not vulnerable (with a
false negative chance of 0.04%).## Installation
Requires Python 3.7 or higher and Pip. Install dependencies as follows:
pip install -r requirements.txt
Note that running `pip install impacket` should work as well, as long as the script is not broken by future Impacket
versions.## Running the script
The script targets can be used to target a DC or backup DC. It likely also works against a read-only DC, but this has
not been tested. Given a domain controller named `EXAMPLE-DC` with IP address `1.2.3.4`, run the script as follows:./zerologon_tester.py EXAMPLE-DC 1.2.3.4
The DC name should be its NetBIOS computer name. If this name is not correct, the script will likely fail with a
`STATUS_INVALID_COMPUTER_NAME` error.A Whitepaper on this vulnerability will be published here: https://www.secura.com/blog/zero-logon on Monday 14 sept.
## Running via Docker
Instead of running the script locally, you can also run a Docker container as follows:
sudo docker run -it ttervoort/zerologon-tester EXAMPLE-DC 1.2.3.4