Zerologon
CVE-2020-1472
Last updated
CVE-2020-1472
Last updated
Check:
Exploit:
Exploits above will break the domain! Use this technique by @dirkjanm to abuse Zerologon safely:
Checking that a DC is a RODC (see if WRITABLE
flag is present):
"When a user authenticates to an RODC a check is performed to see if the password is cached. If the password is cached, the RODC will authenticate the user account locally. If the user’s password is not cached, then the RODC forwards the authentication request to a writable Domain Controller which in turn authenticates the account and passes the authenticated request back to the RODC. Once the user account is authenticated, the RODC makes another request for the replication of the user’s password in a unidirectional replication providing the account has been configured to allow replication. In order to allow the user password to be cached on RODC, you could set up it by configuring the Password Replication Policy."
So when authenticating at a RODC and Password Replication Policy rejects caching the machine password, then STATUS_NO_TRUST_SAM_ACCOUNT
may be met.