关联漏洞
标题:
Microsoft Windows Netlogon 安全特征问题漏洞
(CVE-2020-1472)
描述:Microsoft Windows Netlogon是美国微软(Microsoft)公司的Windows的一个重要组件,主要功能是用户和机器在域内网络上的认证,以及复制数据库以进行域控备份,同时还用于维护域成员与域之间、域与域控之间、域DC与跨域DC之间的关系。 Microsoft Windows Netlogon 存在安全漏洞。攻击者可以使用 Netlogon 远程协议 (MS-NRPC) 建立与域控制器的易受攻击的 Netlogon 安全通道连接并进行特权提升。
描述
Test script for CVE-2020-1472 for both RPC/TCP and RPC/SMB
介绍
# Zerologon test for SMB & RPC
A python script based on [SecuraBV script](https://github.com/SecuraBV/CVE-2020-1472).
Demonstrates that CVE-2020-1472 can be done via RPC/SMB, and not only over RPC/TCP.
Additionaly, there is a random byte in the final client challange & client credential - to test against trivial IDS signatures.
The RPC/SMB scan runs by default. Depending on the target server, some may require a valid authenticated user to get permission to the netlogon pipe.
# Execution
```python
usage: zerologon_test.py [-h] [-u] [-d] [-p] [-t] [-pp] dc_name dc_ip
Perform zerologon test over RPC/TCP or RPC/SMB
positional arguments:
dc_name NetBIOS name of the domain controller
dc_ip ip address of the domain controller
optional arguments:
-h, --help, /?, /h, /help
show this help message and exit
-u , --user authenticated domain user,may be required for SMB
-d , --domain domain name, required only when authentication over SMB
-p , --pass authenticated domain user's password, may be required for SMB
-t , --type rpc or smb scan. choices: [smb, rpc], (default: 'smb').
-pp, --privacy if exists adds packet privacy
```
文件快照
[4.0K] /data/pocs/cb161ddc3f84428f4dd589e4caa35f790d94468a
├── [1.0K] LICENSE
├── [1.2K] README.md
├── [ 289] requirements.txt
└── [4.9K] zerologon.py
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。