Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-20674 PoC — Windows Kerberos Security Feature Bypass Vulnerability

Source
Associated Vulnerability
Title:Windows Kerberos Security Feature Bypass Vulnerability (CVE-2024-20674)
Description:Windows Kerberos Security Feature Bypass Vulnerability
Readme
# CVE-2024-20674

This is my take at an exploit of the public CVE CVE-2024-20674 to achieve Kerberos mutual authentication bypass using a logic bug in the client-side handling of Kerberos U2U TGT-REP.
This can be used for instance to serve arbitrary GPOs when spoofing the DC to a client, and take control of a machine.

**Pre-requisites**: Network Man In the Middle, unauthenticated.

### Explanation of the exploit in this paper

https://www.sstic.org/2025/presentation/l_outillage_reseau_windows_une_affaire_d_implementation/

### Demo

https://github.com/user-attachments/assets/6dc25e26-b42a-41a0-bc73-8fc4a0a0c5ee

### Warning

The demo/ folder contains GPOs that will probably destroy the client configuration (add guest user to Administrators, disable UAC, disable firewall)
File Snapshot

[4.0K] /data/pocs/739c5940514475f713668e382cc31e029528a024 ├── [4.0K] demo │   └── [4.0K] domain.local │   └── [4.0K] Policies │   └── [4.0K] {31B2F340-016D-11D2-945F-00C04FB984F9} │   ├── [ 27] gpt.ini │   └── [4.0K] Machine │   ├── [4.0K] Microsoft │   │   └── [4.0K] Windows NT │   │   └── [4.0K] SecEdit │   │   └── [1.8K] GptTmpl.inf │   ├── [3.5K] registry.pol │   └── [4.0K] Scripts │   └── [ 0] scripts.ini ├── [6.0M] demo_video.mp4 ├── [7.8K] exploit.py └── [ 783] README.md 9 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →