zerologon vulnerability exploit research paper
Security Research

Understanding and Exploiting Zerologon

This paper aims to explain the detailed working of Zerologon vulnerability. Zerologon vulnerability arise due to insecure implementation of AES-128 Counter Feedback Mode of Operation in Microsoft Netlogon Remote Procedure Calls (MS-NRPC) protocol.

Key Pointers:
  • Understanding what is Netlogon protocol and how it works.
  • Different vulnerabilities in this protocol and how to check for them.
  • Prerequisites to setup the lab to perform the exploit.
  • Running the testers and crafting the exploit.
  • Mitigatiuons and Preventions to prevent such attacks.

Brands that
trust our competence

Explore more
kfc logo
discover logo
adp logo
adbed bath beyond logo
expedia logo
chipotle logo
molina
Mosaic Insurance logo
dell logo
fannie-mae logo
 maersk logo
 gsk logo
 wiz logo
 bt logo