monkey/docs/content/reference/exploiters/Zerologon.md

1.0 KiB

title date draft tags
Zerologon 2021-01-31T19:46:12+05:30 false
exploit
windows

The Zerologon exploiter exploits CVE-2020-1472.

This exploiter is unsafe.

  • It will temporarily change the target domain controller's password.
  • It may break the target domain controller's communication with other systems in the network, affecting functionality.

It is, therefore, not enabled by default.

Description

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC).

To download the relevant security update and read more, click here.

Notes

  • The Infection Monkey exploiter implementation is based on implementations by @dirkjanm and @risksense.