zerologon vulnerability exploit research paper
Security Research

Understanding and Exploiting Zerologon

This paper aims to explain the detailed working of Zerologon vulnerability. Zerologon vulnerability arise due to insecure implementation of AES-128 Counter Feedback Mode of Operation in Microsoft Netlogon Remote Procedure Calls (MS-NRPC) protocol.

Key Pointers:
  • Understanding what is Netlogon protocol and how it works.
  • Different vulnerabilities in this protocol and how to check for them.
  • Prerequisites to setup the lab to perform the exploit.
  • Running the testers and crafting the exploit.
  • Mitigatiuons and Preventions to prevent such attacks.
Get the Research Paper
Thank You for your interest in Safe Security!
Your request content is now available!
Invalid Inputs!

Brands that
trust our competence

Explore more
molina logo
icici logo
british telecom logo
munichre logo
newscorp logo
kfc logo