https://github.com/bb00/zer0dump
Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.
https://github.com/bb00/zer0dump
Last synced: 4 months ago
JSON representation
Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.
- Host: GitHub
- URL: https://github.com/bb00/zer0dump
- Owner: bb00
- Created: 2020-09-14T19:27:14.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2023-03-02T19:40:19.000Z (over 2 years ago)
- Last Synced: 2024-11-21T14:38:05.273Z (12 months ago)
- Language: Python
- Size: 55.7 KB
- Stars: 176
- Watchers: 7
- Forks: 44
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - bb00/zer0dump - Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password. (Python)
README
# Zer0Dump
Zer0dump is an PoC exploit/tool for abusing the vulnerabilities associated with CVE-2020-1472 (Zerologon) in order
to initiate a full system takeover of an unpatched Windows domain controller.
Special thanks to [@dirkjanm](https://github.com/dirkjanm) and [@SecureAuthCorp](https://github.com/SecureAuthCorp/impacket)