Vuln chaining: exploit Zerologon & take over the Domain Controller

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ก.ย. 2024
  • Understand how attackers can exploit Zerologon to access the Microsoft Active Directory domain controllers of your machine. This step by step PoC shows what role removing or changing the credentials for a service account plays in this attack.
    🛠 Learn how to find and exploit CVE-2020-1472, which has a 10/10 CVSS score.
    ⚙️ Read the full technical guide by Cristian Cornea and learn how attackers use vulnerability chaining to exploit the Zerologon vulnerability ➡️ pentest-tools....
    ______________
    💡 See ALL OUR TOOLS: pentest-tools....
    @ us on Twitter: / pentesttoolscom
    Join 46k+ offensive security specialists on LinkedIn: / pentesttools
    #PenetrationTesting #Pentesting #EthicalHacking #PentestToolsCom
    ______________
    WHAT IS Pentest-Tools.com?
    Use the Pentest-Tools.com platform to quickly detect and report vulnerabilities in websites and network infrastructures!
    ✔ 20+ tightly integrated penetration testing and ethical hacking tools for easier, faster, and more effective engagements
    ✔ Built for pentesters, sysadmins, web devs, MSPs, business owners, and other professionals seeking to automate and save time
    ✔ Painless vulnerability management: add manual findings, change risk levels, delete obsolete targets, create and export customizable reports (complete with vulnerability information and remediation suggestions)
    ✔ Instant overview of all open ports, services, and running software from all your targets in a central, unified view (Attack Surface)
    ✔ Comprehensive scanning options: scheduled scans, robust API, internal network scanning through VPN agent, scan multiple targets at the same time
    ✔ Flexible subscription: choose monthly billing and you can cancel anytime. Alternatively, choose the yearly plan and get a 15% discount!
    "Pentest-Tools is great for streamlining any security engagement" - Tavis D., Security Engineering Manager
    "A superb toolbox, not the usual easy online toy" - Mauro G., DevOps Specialist
    “Pentest-Tools.com is the Swiss Army Knife of scanning tools”
    Mark D., Apple Certified Support Professional
    See how our customers use the platform:
    www.g2.com/pro...

ความคิดเห็น • 1

  • @PentestToolscom
    @PentestToolscom  2 ปีที่แล้ว

    ⚙ Read the full technical guide by Cristian Cornea and learn how attackers use vulnerability chaining to exploit the Zerologon vulnerability ➡ pentest-tools.com/blog/zerologon-vulnerability-chaining