zerologon
lsadump::zerologon
detects and exploits the ZeroLogon vulnerability. It has the following command line arguments:
/account
: the target DC SamAccountName/target
: the target DC FQDN/exploit
: proceed with exploitation/null
: null session authentication/ntlm
: use NTLM authentication/type
: The Secure Channel Types. The available values are:Null
MsvAp
Workstation
TrustedDnsDomain
TrustedDomainUasServer
Server
CdcServer
This technique can break the domain's replication services hence leading to massive disruption, running the following "password change" technique is not advised.
Detection
Exploitation
A DCSync can then be conducted with lsadump::dcsync
.
Last updated