![zerologon vulnerability exploit research paper](/assets/img/research-paper/preview/zerologon-vulnerability-exploit-research-paper.png)
Security Research
Understanding and Exploiting Zerologon
This paper aims to explain the detailed working of Zerologon vulnerability. Zerologon vulnerability arise due to insecure implementation of AES-128 Counter Feedback Mode of Operation in Microsoft Netlogon Remote Procedure Calls (MS-NRPC) protocol.
Key Pointers:
- Understanding what is Netlogon protocol and how it works.
- Different vulnerabilities in this protocol and how to check for them.
- Prerequisites to setup the lab to perform the exploit.
- Running the testers and crafting the exploit.
- Mitigatiuons and Preventions to prevent such attacks.
Brands that
trust our competence
Explore more![kfc logo](/assets/img/homee/customers/logos/kfc-logo.png)
![discover logo](/assets/img/homee/customers/logos/discover-financial-services.png)
![adp logo](/assets/img/homee/customers/logos/adp.png)
![adbed bath beyond logo](/assets/img/homee/customers/logos/bed-bath-and-beyond.png)
![expedia logo](/assets/img/homee/customers/logos/expedia.png)
![chipotle logo](/assets/img/homee/customers/logos/chipotle-mexican-grill-inc.png)
![molina](/assets/img/homee/customers/logos/molina.png)
![Mosaic Insurance logo](/assets/img/homee/customers/new-logos/mosaic-insurance.png)
![](/assets/img/homee/customers/logos/cedar-sinai.png)
![dell logo](/assets/img/homee/customers/logos/dell.png)
![fannie-mae logo](/assets/img/homee/customers/logos/fannie-mae.png)
![maersk logo](/assets/img/homee/customers/logos/maersk.png)
![gsk logo](/assets/img/homee/customers/new-logos/gsk.png)
![wiz logo](/assets/img/homee/customers/new-logos/wiz.png)
![bt logo](/assets/img/homee/customers/new-logos/bt.png)