Simulation of the Zerologon (CVE-2020-1472) vulnerability attack in Active Directory on Windows Server 2016 and the use of the Trend Micro Deep Security solution to prevent such attacks. # Simulating-and-preventing-Zerologon-CVE-2020-1472-vulnerability-attacks.
Simulation of the Zerologon (CVE-2020-1472) vulnerability attack in Active Directory on Windows Server 2016 and the use of the Trend Micro Deep Security solution to prevent such attacks.
The Zerologon vulnerability is a weakness in the Netlogon protocol that can be exploited without requiring a password, allowing attackers to easily take control of the Domain Controller in the Active Directory system.
# Tools
- VMware Workstation
- Windows Server 2016
- Active Directory
- Kali Linux
- Docker
- Zerologon (CVE-2020-1472) : In this attack simulation Checker & Exploit Code for CVE-2020-1472 aka Zerologon was used from https://github.com/VoidSec/CVE-2020-1472?tab=readme-ov-file.
- Python
- Trend Micro Deep Security
# Operating Results
- Report : [Preventing-Zerologon_TrendMicroDeepSecurity.pdf](https://github.com/user-attachments/files/19119536/Preventing-Zerologon_TrendMicroDeepSecurity.pdf)
- Presentation : https://www.canva.com/design/DAGgprAk-7w/AHZBOGVKFCevhfDvBI9Ehg/edit?utm_content=DAGgprAk-7w&utm_campaign=designshare&utm_medium=link2&utm_source=sharebutton
[4.0K] /data/pocs/6e403a2ac5671164c4364482ab4fcd53d0bbe357
└── [1.1K] README.md
0 directories, 1 file