Skip to content

Test tool for CVE-2020-1472 for the entire domain, forked from SecuraBV

License

Notifications You must be signed in to change notification settings

silverfort-open-source/zerologon-entire-domain-tester

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Silverfort's scanner for compromised DCs with Zerologon

Installation

Based on the Secura's code: https://github.com/SecuraBV/CVE-2020-1472/blob/master/zerologon_tester.py If you run the script in a Windows environment please make sure the you have the PowerShell "ActiveDirectory" module installed, if you don't please follow this guide: https://4sysops.com/wiki/how-to-install-the-powershell-active-directory-module/ In case your computer runs other operating system or you want to use LDAP/LDAPS query, please make sure you have all the dependencies described here: https://www.python-ldap.org/en/python-ldap-3.3.0/installing.html. For installing all the relevant python modules use -i.

Running the script

The script gets a domain as an input and returns the list of Domain Controller under the domain. For Windows environments the script uses PowerShell commands to retrieve the list of DCs. In other environments, the script uses LDAP/LDAPS query and therefore it requires also the username and password of any domain user (not necessarily admin). Example of running the scipt:

./zerologon_tester.py EXAMPLE-DOMAIN

For any questions, please contact info@silverfort.com

About

Test tool for CVE-2020-1472 for the entire domain, forked from SecuraBV

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%