Zerologon (CVE-2020-1472) <-> Red|Blue Teams

This vulnerability allowed threat actor to foothold on your enterprise network to become a domain admin with single click.

The vulnerability stems from a flaw in a cryptographic authentication scheme used by the Netlogon Remote Protocol, which among other things can be used to update computer passwords. This flaw allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf.

RedTeam - Offensive Tools/Scripts:

Python Exploit - ZeroLogon (CVE-2020-1472)

BlueTeam - Defense:

Windows Event Correlation:

  • Keep an eye our Event ID 4624 followed by a 4742.
  • Failed attempts look for Event ID 5805
Windows Events - ZeroLogon (CVE-2020-1472)

Snort Rule

alert tcp any any -> [!<domaincontrollers to exclude here] [49152:65535] (msg:"Possible DCSync Detected"; flow:to_server,established; flags:PA; content:"|00 03 10 00 00 00|"; depth:8; content:"|03 00|"; distance:14; classtype:attempted-admin; sid:20166316;)

Other Detections:

Reference Articles/Posts:

ZeroLogon Article Twitter - @SBousseaden Twitter - @joshlemon

updated_at 17-09-2020