risksense / zerologon

Exploit for zerologon cve-2020-1472
MIT License
635 stars 146 forks source link

Traceback (most recent call last): File "/root/zerologon/set_empty_pw.py", line 147, #13

Open Rajmsr opened 10 months ago

Rajmsr commented 10 months ago

Traceback (most recent call last): File "/root/zerologon/set_empty_pw.py", line 147, in perform_attack('\\' + dc_name, dc_ip, dc_name) File "/root/zerologon/set_empty_pw.py", line 123, in perform_attack rpc_con = try_zero_authenticate(dc_handle, dc_ip, target_computer) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/root/zerologon/set_empty_pw.py", line 28, in try_zero_authenticate binding = epm.hept_map(dc_ip, nrpc.MSRPC_UUID_NRPC, protocol='ncacn_ip_tcp') ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/usr/lib/python3/dist-packages/impacket/dcerpc/v5/epm.py", line 1328, in hept_map resp = dce.request(request) ^^^^^^^^^^^^^^^^^^^^ File "/usr/lib/python3/dist-packages/impacket/dcerpc/v5/rpcrt.py", line 880, in request raise exception impacket.dcerpc.v5.rpcrt.DCERPCException: DCERPC Runtime Error: code: 0x16c9a0d6 - ept_s_not_registered