CVSS | 5 |
---|---|
DESCRIPTION | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'. |
HEAT SCORE | 13600 |
DATE | TWEETS | USER |
---|---|---|
2023-05-06 06:10:23 | 🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2020-1472: https://t.co/BxcU5estlK 👉 CVE-2023-27326… https://t.co/ra6IEbWqI0 https://github.com/G0urmetD/Zerologon-CVE-2020-1472 https://twitter.com/i/web/status/1654730001617502209 | Prohacktiv3 |
2023-05-01 17:02:50 | 🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2020-1472: https://t.co/uxCPnRXJXn https://t.co/3nTBmm7pJo https://github.com/Akash7350/CVE-2020-1472 | Prohacktiv3 |
2023-04-23 18:12:07 | Zero Logon - I have just completed this room! Check it out: https://t.co/Ep2Po4lTUP #tryhackme #CVE-2020-1472… https://t.co/8iALxbaKaZ https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1650198228464173059 | AgntLgn |
2023-04-06 13:35:41 | @ipv6labs NetAppのKB、まともに読めない問題 CVE-2020-1472なんでしょうけどKBにCVE-2018-1472って書いてあるし...それにしてもCIFSで使ってるとたいへんそうですね... | g_plains |
2023-04-01 15:40:33 | Zero Logon - I have just completed this room! Check it out: https://t.co/kUGHN5KGeN #tryhackme #CVE-2020-1472… https://t.co/TUVBHqjNyo https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1642189775007301634 | Christe05505504 |
2023-03-12 14:30:16 | Zero Logon - I have just completed this room! Check it out: https://t.co/1KzeKypI7b #tryhackme #CVE-2020-1472… https://t.co/NiiTppD5IU https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1634923920485912578 | MParis84 |
2023-03-11 10:31:45 | Zero Logon - I have just completed this room! Check it out: https://t.co/fMjU6x0YBW #tryhackme #CVE-2020-1472… https://t.co/q39V6oYOM0 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1634500732782034946 | ArmeriaVillosa |
2023-02-20 07:37:56 | 🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2020-1472: https://t.co/kCAxJKSDni 👉 CVE-2022-0492:… https://t.co/PQaof0jLho https://github.com/RicYaben/CVE-2020-1472-LAB https://twitter.com/i/web/status/1627564125713797122 | Prohacktiv3 |
2023-02-15 21:38:30 | The list of Active Directory scanners/attacks implemented for now: - SMB signing - ZeroLogon (CVE-2020-1472) by Se… https://t.co/7kgYV95Bu3 https://twitter.com/i/web/status/1625969342998347788 | MizaruIT |
2023-02-14 00:19:50 | New post from https://t.co/uXvPWJy6tj ([AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要) has been published on https://t.co/gJjKt926Qu http://www.sesin.at https://www.sesin.at/2023/02/14/ad-%e7%ae%a1%e7%90%86%e8%80%85%e5%90%91%e3%81%91-cve-2020-1472-netlogon-%e3%81%ae%e5%af%be%e5%bf%9c%e3%82%ac%e3%82%a4%e3%83%80%e3%83%b3%e3%82%b9%e3%81%ae%e6%a6%82%e8%a6%81/ | WolfgangSesin |
2023-02-14 00:18:46 | New post from https://t.co/9KYxtdZjkl ([AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要) has been published on https://t.co/ySYQu8lct6 http://www.sesin.at https://www.sesin.at/2023/02/14/ad-%e7%ae%a1%e7%90%86%e8%80%85%e5%90%91%e3%81%91-cve-2020-1472-netlogon-%e3%81%ae%e5%af%be%e5%bf%9c%e3%82%ac%e3%82%a4%e3%83%80%e3%83%b3%e3%82%b9%e3%81%ae%e6%a6%82%e8%a6%81/ | www_sesin_at |
2023-02-10 16:16:21 | 「当該組織によるフォレンジック調査の結果、AD の Zerologon(CVE-2020-1472)と呼ばれる脆弱性が悪用された痕跡が確認されたとのことである。」 🥲 | 0x009AD6_810 |
2023-01-20 18:21:27 | 9️⃣ ZeroLogon (CVE-2020-1472) Allows an attacker to gain unauthorized access to a domain controller by sending a… https://t.co/tyHQ9jlbgz https://twitter.com/i/web/status/1616499752572715008 | SentinelOne |
2023-01-05 21:12:32 | New post (Zerologon (CVE-2020-1472): Critical Active Directory Vulnerability) has been published on… https://t.co/AnhM62uWGg https://twitter.com/i/web/status/1611106764841271296 | zamarax |
2022-12-28 22:20:07 | Zero Logon - I have just completed this room! Check it out: https://t.co/8ziFTamGGZ #tryhackme #CVE-2020-1472… https://t.co/dicLIGbHky https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1608225176801394689 | lerchmirko |
2022-12-21 17:26:43 | Zero Logon - I have just completed this room! Check it out: https://t.co/WkglHilhzR #tryhackme #CVE-2020-1472… https://t.co/fwAMgEoiAs https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1605581345094189056 | Praison01 |
2022-12-21 16:59:24 | Zero Logon - I have just completed this room! Check it out: https://t.co/WkglHilhzR #tryhackme #CVE-2020-1472… https://t.co/fwAMgEoiAs https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1605581345094189056 | Praison01 |
2022-12-16 00:51:29 | Zero Logon - I have just completed this room! Check it out: https://t.co/f3IL99pHlL #tryhackme #CVE-2020-1472… https://t.co/hjVFpQHwlp https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1603535234296791041 | Jasonlee2504 |
2022-12-07 01:50:57 | 引用:Windowsの認証プロトコルである「Netlogon」に存在する脆弱性(CVE-2020-1472、「Zerologon」と呼ばれている)を悪用して、ドメイン管理者権限を取得する手口 https://t.co/HREaV6w6VK https://japan.zdnet.com/article/35196986/ | skycancer |
2022-11-29 16:41:09 | CVE-2020-1472域内提权漏洞利用 https://t.co/yGrupTQgwU https://t.co/peQv4eI0xr https://ift.tt/412zlNV https://ift.tt/tKXgzsP | buaqbot |
2022-11-19 17:21:47 | zerologon CVE-2020-1472 aka Zerologon Exploit POC NetLogon (MS-NRPC), can establish inter-domain control vulnerab… https://t.co/SrrAHH1FSn https://twitter.com/i/web/status/1594015224012869637 | hack_git |
2022-11-17 15:40:38 | Zero Logon - I have just completed this room! Check it out: https://t.co/6WAHf7lm1s #tryhackme #CVE-2020-1472… https://t.co/kOdmhVzIwe https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1593267039279681536 | nullshock1 |
2022-11-08 22:22:28 | Zero Logon - I have just completed this room! Check it out: https://t.co/EhyTgIlweP #tryhackme #CVE-2020-1472… https://t.co/Ka4mBSLvak https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1590103198643417088 | clars2k |
2022-11-04 06:40:49 | Emerging Vulnerability Found CVE-2020-1472 - An elevation of privilege vulnerability exists when an attacker establ… https://t.co/FaCuSz6J80 https://twitter.com/i/web/status/1588418503832469504 | ColorTokensInc |
2022-11-04 00:03:13 | 「偵察段階を超えて、Black Basta はさまざまなエクスプロイトを通じて、ローカルおよびドメイン レベルの権限昇格を試みます。ZeroLogon (CVE-2020-1472)、NoPac (CVE-2021-42287、C… https://t.co/eOfAFc3akC https://twitter.com/i/web/status/1588319008428032000 | NobMiwa |
2022-11-03 22:57:09 | Zero Logon - I have just completed this room! Check it out: https://t.co/caKiauAh3a #tryhackme #CVE-2020-1472… https://t.co/b5O5KXigyx https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1588297625174183936 | SquareByte_Tech |
2022-10-28 21:43:41 | Zerologon — Netlogon Elevation of Privilege Vulnerability — CVE-2020-1472 https://t.co/E1MtGECb1r #cybersecurity #cve20201472 #cve http://dlvr.it/SbtLXs | iSecurity |
2022-10-08 23:50:11 | Zero Logon - I have just completed this room! Check it out: https://t.co/UNUc1BXxjX #tryhackme #CVE-2020-1472… https://t.co/ypKOSotq3O https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1578894618514444288 | Sirlike20 |
2022-10-07 05:54:34 | Zero Logon - I have just completed this room! Check it out: https://t.co/hcZaJcG8b9 #tryhackme #CVE-2020-1472… https://t.co/KcqX8PDGs7 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1578258972317982721 | IngyaJoshua |
2022-09-30 16:55:41 | Zero Logon - I have just completed this room! Check it out: https://t.co/ePXMUoqHp4 #tryhackme #CVE-2020-1472… https://t.co/f9FvEC0CLj https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1575887583199887365 | charmassie |
2022-09-30 09:44:13 | Tool for mass scanning ZeroLogon vulnerability CVE-2020-1472 https://t.co/oHq83wQ8a2 https://github.com/guglia001/MassZeroLogon | MarioGuglia |
2022-09-30 07:23:18 | 用于大规模测试 ZeroLogon 漏洞 CVE-2020-1472 的工具 https://t.co/VGjdyovQQY https://t.co/Ud9MefyzWE https://ift.tt/WtRyF9K https://ift.tt/Fi34rsL | buaqbot |
2022-09-22 03:01:14 | Zero Logon - I have just completed this room! Check it out: https://t.co/tC1ZjeMyQR #tryhackme #CVE-2020-1472… https://t.co/ElNSEZ4e2y https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1572782634903674881 | andretorresbr |
2022-09-12 00:01:24 | Zero Logon - I have just completed this room! Check it out: https://t.co/R4ADvhfeNO #tryhackme #CVE-2020-1472… https://t.co/zVcQav9zcV https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1569111531643703297 | ITPR_Guy |
2022-09-05 11:41:13 | Zero Logon - I have just completed this room! Check it out: https://t.co/hVD2onuupC #tryhackme #CVE-2020-1472… https://t.co/enUlgnwhI2 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1566751911461675008 | dzolti |
2022-09-01 23:00:21 | Zero Logon - I have just completed this room! Check it out: https://t.co/x0BMKqUphe #tryhackme #CVE-2020-1472… https://t.co/69srnBaFqp https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1565472899762475009 | Mach1982 |
2022-08-29 12:55:08 | Hacking Active Directory - Zerologon (CVE-2020-1472) Today I will demonstrate how to hack active directory using Z… https://t.co/JNrLpSFdut https://twitter.com/i/web/status/1564231746375372806 | xogutu |
2022-08-29 05:11:07 | 🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2022-27255: https://t.co/mCYNlSAI79 👉 CVE-2020-1472… https://t.co/pvzSTzSiss https://github.com/stryker-project/CVE-2022-27255-checker https://twitter.com/i/web/status/1564117370653876227 | Prohacktiv3 |
2022-08-28 20:55:40 | Zero Logon - I have just completed this room! Check it out: https://t.co/bqdhatG7tg #tryhackme #CVE-2020-1472… https://t.co/hROm05hKDR https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1563969670377603073 | wittyAle123 |
2022-08-23 20:30:51 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/Bf6FspCuG4 https://t.co/TC75M6OpBw https://ift.tt/TySd9DJ https://ift.tt/giE5Iql | buaqbot |
2022-07-01 23:10:22 | Zero Logon - I have just completed this room! Check it out: https://t.co/ZaIGABwJzA #tryhackme #CVE-2020-1472… https://t.co/nmmhefb2RO https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1543008829046153219 | B_key01 |
2022-06-24 06:32:22 | 🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2020-1472: https://t.co/w789rLjs0W https://github.com/lele8/CVE-2020-1472 | Prohacktiv3 |
2022-06-22 09:56:38 | CVE-2020-1472 https://t.co/cT7etM2nHQ https://t.co/IMhGWeQpuZ https://ift.tt/aKj5swq https://ift.tt/zgkcemt | buaqbot |
2022-06-15 23:04:05 | Zero Logon - I have just completed this room! Check it out: https://t.co/j60gme1G7T #tryhackme #CVE-2020-1472… https://t.co/0aa5VjU9OD https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1537206950244630528 | AzikeCT |
2022-06-11 20:40:34 | Zero Logon - I have just completed this room! Check it out: https://t.co/A8RkFvJKcc #tryhackme #CVE-2020-1472… https://t.co/6FaJLtdI3v https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1535722781601562626 | scovled123 |
2022-06-10 09:00:06 | Zero Logon - I have just completed this room! Check it out: https://t.co/qDlCCmdCmT #tryhackme #CVE-2020-1472… https://t.co/esoR7kjoBR https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1535184356934918144 | ruhellio |
2022-06-02 02:13:22 | Zero Logon - I have just completed this room! Check it out: https://t.co/ZTgJAjnMKM #tryhackme #CVE-2020-1472… https://t.co/SMFlHfXQVT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1532181397170962432 | crypto_cache |
2022-05-18 08:35:58 | Zero Logon - I have just completed this room! Check it out: https://t.co/gWGSJ6PPAt #tryhackme #CVE-2020-1472… https://t.co/AJAGv4brAg https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1526738594144067585 | Oxmar00 |
2022-05-18 08:20:44 | Zero Logon - I have just completed this room! Check it out: https://t.co/gWGSJ6PPAt #tryhackme #CVE-2020-1472… https://t.co/AJAGv4brAg https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1526738594144067585 | Oxmar00 |
2022-05-18 07:51:52 | Zero Logon - I have just completed this room! Check it out: https://t.co/gWGSJ6PPAt #tryhackme #CVE-2020-1472… https://t.co/AJAGv4brAg https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1526738594144067585 | Oxmar00 |
2022-05-18 07:37:50 | Zero Logon - I have just completed this room! Check it out: https://t.co/gWGSJ6PPAt #tryhackme #CVE-2020-1472… https://t.co/AJAGv4brAg https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1526738594144067585 | Oxmar00 |
2022-04-28 00:35:31 | Zero Logon - I have just completed this room! Check it out: https://t.co/KyP0GiGOco #tryhackme #CVE-2020-1472… https://t.co/jLmn1qJk7D https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1518658625039908865 | infosec_Brady |
2022-04-27 23:43:04 | Zero Logon - I have just completed this room! Check it out: https://t.co/KyP0GiGOco #tryhackme #CVE-2020-1472… https://t.co/jLmn1qJk7D https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1518658625039908865 | infosec_Brady |
2022-04-27 21:36:30 | Zero Logon - I have just completed this room! Check it out: https://t.co/KyP0GiGOco #tryhackme #CVE-2020-1472… https://t.co/jLmn1qJk7D https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1518658625039908865 | infosec_Brady |
2022-04-27 09:41:26 | New post from https://t.co/uXvPWJy6tj (CVE-2020-1472 (debian_linux, directory_server, fedora, leap, samba, ubuntu_l… https://t.co/t0X16cnqex http://www.sesin.at https://twitter.com/i/web/status/1519249212998930433 | WolfgangSesin |
2022-04-27 09:41:17 | New post from https://t.co/9KYxtdZjkl (CVE-2020-1472 (debian_linux, directory_server, fedora, leap, samba, ubuntu_l… https://t.co/NJTC0srOjs http://www.sesin.at https://twitter.com/i/web/status/1519249214454259718 | www_sesin_at |
2022-04-26 19:12:53 | Samba - CVE-2020-1472: https://t.co/bGRrUVUie0 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472 | LinInfoSec |
2022-04-26 18:46:08 | Severity: 🔥🔥🔥 | An elevation of privilege vulnerability ... | CVE-2020-1472 | Link for more: https://t.co/YtzxwcxaFa http://alerts.remotelyrmm.com/CVE-2020-1472 | RemotelyAlerts |
2022-04-26 17:33:56 | 🚨 NEW: CVE-2020-1472 🚨 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Net… https://t.co/Ut5abksN2L https://twitter.com/i/web/status/1519001673871601664 | threatintelctr |
2022-04-24 18:09:28 | Zero Logon - I have just completed this room! Check it out: https://t.co/yCSgi1ovhs #tryhackme #CVE-2020-1472… https://t.co/Pz0TpsBpLq https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1518058211693182976 | chadtubbs05 |
2022-04-14 12:03:51 | Zero Logon - I have just completed this room! Check it out: https://t.co/kfIEOteVw3 #tryhackme #CVE-2020-1472… https://t.co/iXT2NddEPB https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1514572530916511751 | henriquirus |
2022-03-28 17:31:43 | Zero Logon - I have just completed this room! Check it out: https://t.co/6PO5tUGxXx #tryhackme #CVE-2020-1472… https://t.co/LOv7oZB02v https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1508494464888844300 | t32kmebt_ |
2022-03-28 04:30:53 | Zero Logon - I have just completed this room! Check it out: https://t.co/iDqjvtuKMw #tryhackme #CVE-2020-1472… https://t.co/wKfpSPIzSw https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1508299919198760964 | SmeadWebDev |
2022-03-24 21:12:34 | Zero Logon - I have just completed this room! Check it out: https://t.co/0ejTkLFvzE #tryhackme #CVE-2020-1472… https://t.co/qgnPMrrfIp https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1507100842738044940 | JeromeSeychell |
2022-03-23 22:00:52 | Zero Logon - I have just completed this room! Check it out: https://t.co/tY4ydmfIDe #tryhackme #CVE-2020-1472… https://t.co/C2o14PZK8x https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1506750498094960651 | Abouozil97 |
2022-03-07 00:10:05 | Zero Logon - I have just completed this room! Check it out: https://t.co/ewv2J4NhFx #tryhackme #CVE-2020-1472… https://t.co/gu2ydQ2Eif https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1500623981606490114 | dolIaraday |
2022-02-22 23:40:07 | Today several new Zerologon (CVE-2020-1472) signatures were released. These rules have been tagged with a "signific… https://t.co/2EiVkedHLG https://twitter.com/i/web/status/1496268159325818884 | ET_Labs |
2022-02-22 16:30:44 | Managed to play around with the 'Zero Logon' exploit (#CVE-2020-1472) over on @realtryhackme! It is both amazing an… https://t.co/zDFu2wrrIf https://twitter.com/i/web/status/1496158404292882437 | AshcorpDev |
2022-02-21 20:19:47 | Nice analysis by @TheDFIRReport shows how #Qbot and exploitation of the #Zerologon vulnerability (#CVE-2020-1472) l… https://t.co/0hwpv6iXQJ https://twitter.com/i/web/status/1495748216905732097 | v4ensics |
2022-02-21 19:59:58 | Nice analysis by @TheDFIRReport shows how #Qbot and exploitation of the #Zerologon vulnerability (#CVE-2020-1472) l… https://t.co/0hwpv6iXQJ https://twitter.com/i/web/status/1495748216905732097 | v4ensics |
2022-02-21 19:38:42 | Nice analysis by @TheDFIRReport shows how #Qbot and exploitation of the #Zerologon vulnerability (#CVE-2020-1472) l… https://t.co/0hwpv6iXQJ https://twitter.com/i/web/status/1495748216905732097 | v4ensics |
2022-02-21 19:20:59 | Nice analysis by @TheDFIRReport shows how #Qbot and exploitation of the #Zerologon vulnerability (#CVE-2020-1472) l… https://t.co/0hwpv6iXQJ https://twitter.com/i/web/status/1495748216905732097 | v4ensics |
2022-02-17 14:21:25 | New report out Monday 2/21! You'll see mentions of Qbot, Zerologon (CVE-2020-1472), AdFind, overpass-the-hash, Co… https://t.co/QGoh6qaKFG https://twitter.com/i/web/status/1494314440912736260 | TheDFIRReport |
2022-02-16 12:30:05 | Zero Logon - I have just completed this room! Check it out: https://t.co/0e2x9JOSp2 #tryhackme #CVE-2020-1472… https://t.co/UUyNAZIZ7R https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1493923670951346181 | ksdshu11 |
2022-02-12 04:20:44 | Zero Logon - I have just completed this room! Check it out: https://t.co/0Im7BLyaXk #tryhackme #CVE-2020-1472… https://t.co/H2fsNsKXhb https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1492351734399778817 | genji_x___ |
2022-02-10 12:11:59 | Zero Logon - I have just completed this room! Check it out: https://t.co/tFwZmpHw7Q #tryhackme #CVE-2020-1472… https://t.co/AoRdovKWkX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1491728174442590208 | stringuetta |
2022-02-10 11:43:46 | Zero Logon - I have just completed this room! Check it out: https://t.co/tFwZmpHw7Q #tryhackme #CVE-2020-1472… https://t.co/AoRdovKWkX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1491728174442590208 | stringuetta |
2022-02-01 21:50:32 | Zero Logon - I have just completed this room! Check it out: https://t.co/KdeNtJdX7z #tryhackme #CVE-2020-1472… https://t.co/IS8gLCEg7g https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1488629022267523075 | x_RiKi_ |
2022-01-31 21:40:45 | Zero Logon - I have just completed this room! Check it out: https://t.co/PHN3L0x9ai #tryhackme #CVE-2020-1472… https://t.co/KbTL0fa3h5 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1488265261497077765 | Mirakenic |
2022-01-30 17:00:36 | CVE-2020-1472的分析与复现 https://t.co/jv7BSFdr5s https://t.co/hsSPYK8Ftq https://ift.tt/NjcDmKEqM https://ift.tt/ZFHj42bys | buaqbot |
2022-01-28 22:19:29 | Zero Logon - I have just completed this room! Check it out: https://t.co/pps2pUsI1y #tryhackme #CVE-2020-1472… https://t.co/yJ39iUEvi7 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1487164108986372100 | Cyb3r5toic |
2022-01-26 21:50:14 | Zero Logon - I have just completed this room! Check it out: https://t.co/q6Gyjw6VzJ #tryhackme #CVE-2020-1472… https://t.co/MMmTLI40Dk https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1486456347881140224 | rumagejamie |
2022-01-22 01:40:23 | Zero Logon - I have just completed this room! Check it out: https://t.co/C14dAZ6WVk #tryhackme #CVE-2020-1472… https://t.co/p90ZPdVBlx https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1484670725403328512 | seriousm_bbh |
2022-01-22 01:26:30 | Zero Logon - I have just completed this room! Check it out: https://t.co/C14dAZ6WVk #tryhackme #CVE-2020-1472… https://t.co/p90ZPdVBlx https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1484670725403328512 | seriousm_bbh |
2022-01-22 01:14:14 | Zero Logon - I have just completed this room! Check it out: https://t.co/C14dAZ6WVk #tryhackme #CVE-2020-1472… https://t.co/p90ZPdVBlx https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1484670725403328512 | seriousm_bbh |
2022-01-21 00:20:40 | Zero Logon - I have just completed this room! Check it out: https://t.co/O408eUdTWH #tryhackme #CVE-2020-1472… https://t.co/tmndkJnXe9 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1484317738747457536 | hunterdevil0001 |
2022-01-13 23:39:26 | Zero Logon - I have just completed this room! Check it out: https://t.co/l2GbLPVZzI #tryhackme #CVE-2020-1472… https://t.co/71U6UkFm1c https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1481760033193013251 | bogganj94 |
2022-01-13 15:31:44 | Rubrik CDM - CVE-2020-9478 Zerologon - CVE-2020-1472 DLINK Devices - CVE-2019-17510 Linux Out of Bounds - CVE-2019-… https://t.co/c40Nw5ZtXD https://twitter.com/i/web/status/1481647750723031040 | Har_sia |
2022-01-07 17:40:26 | Zero Logon - I have just completed this room! Check it out: https://t.co/H5p3OLgP98 #tryhackme #CVE-2020-1472… https://t.co/rD7Rfe9pS3 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1479506604378755080 | polymathiann |
2022-01-02 07:50:08 | Zero Logon - I have just completed this room! Check it out: https://t.co/sqskkmmomH #tryhackme #CVE-2020-1472… https://t.co/jTdJ8EV39U https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1477547076779220995 | DoolztheDaring |
2022-01-01 22:34:02 | Zero Logon - I have just completed this room! Check it out: https://t.co/IibiZP16Gj #tryhackme #CVE-2020-1472… https://t.co/7q8bmb07it https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1477401457280303110 | of3ll |
2022-01-01 18:22:46 | Zero Logon - I have just completed this room! Check it out: https://t.co/LvkY1aO7oA #tryhackme #CVE-2020-1472… https://t.co/S9TT62tigP https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1477288523187302405 | zhiliao_shi |
2022-01-01 18:03:08 | Zero Logon - I have just completed this room! Check it out: https://t.co/LvkY1aO7oA #tryhackme #CVE-2020-1472… https://t.co/S9TT62tigP https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1477288523187302405 | zhiliao_shi |
2021-12-23 14:11:56 | #Обучение ZeroLogon в Windows Server. Эксплуатация CVE-2020-1472... https://t.co/npdrYKtgBL https://t.co/WPJmWKOxAj https://t.me/s/it_news_for_all/37605 | IT_news_for_all |
2021-12-23 13:03:34 | Zero Logon - I have just completed this room! Check it out: https://t.co/fzqq7pSOhx #tryhackme #CVE-2020-1472… https://t.co/96nlBPmxh7 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1473997921326673923 | tekgurl_kayla |
2021-12-22 07:17:07 | CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon se… https://t.co/j26cYqenjz https://twitter.com/i/web/status/1473549702616567810 | VulmonFeeds |
2021-12-18 22:32:57 | Zero Logon - I have just completed this room! Check it out: https://t.co/WySI650LVQ #tryhackme #CVE-2020-1472… https://t.co/o2KK39Lz4D https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1472324798504214528 | CaladanJC |
2021-12-15 22:52:40 | Zerologon(CVE-2020-1472)のときも、今回のApache Log4j(CVE-2021-44228)でも #TryHackMe にて動作検証。 実際に手を動かすことで如何に刺さりやすい脆弱性であるのか実体験とし… https://t.co/5x4MR1C63i https://twitter.com/i/web/status/1471249621444096001 | v_avenger |
2021-12-15 22:51:47 | Zerologon(CVE-2020-1472)に関する #TryHackMe のルームはこちら。 https://t.co/mhqAMA4xcP https://tryhackme.com/room/zer0logon | v_avenger |
2021-12-15 18:48:03 | Zero Logon - I have just completed this room! Check it out: https://t.co/SOSmj9kXF8 #tryhackme #CVE-2020-1472… https://t.co/RNGLQBcscK https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1471186134751449089 | swehtpantz |
2021-12-06 06:20:04 | Zero Logon - I have just completed this room! Check it out: https://t.co/6WYy4eVPdI #tryhackme #CVE-2020-1472… https://t.co/dOl6ELKyQo https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1467739262615388165 | grumpzsux |
2021-12-01 14:12:40 | Live hacking demo of CVE-2020-1472 & CVE-2021-26084: ✔️ Industry expert best practices from Brad LaPorte: ✔️Learn h… https://t.co/8J7F49jcOd https://twitter.com/i/web/status/1466044464871481347 | nopsec |
2021-11-10 05:13:58 | Hoja de referencia de detección de exploits CVE-2020-1472 (#Zerologon) https://t.co/i52CrCQhsA https://www-kroll-com.translate.goog/en/insights/publications/cyber/cve-2020-1472-zerologon-exploit-detection-cheat-sheet?_x_tr_sl=en&_x_tr_tl=es&_x_tr_hl=en-GB&_x_tr_pto=nui | ov3rflow1 |
2021-11-01 12:20:13 | #rootsector ➡️Zerologon (CVE-2020-1472) exploited 2 hours after initial execution of Bazar ➡️Cobalt Strike & Bazar… https://t.co/Wj5fex35J3 https://twitter.com/i/web/status/1455146356176261132 | Rootsector |
2021-10-29 13:50:19 | Exactly one year ago, @CISAgov warned us about the continued #exploitation of CVE-2020-1472. Today, our #ArcticEWS… https://t.co/lZlIGJtzH7 https://twitter.com/i/web/status/1454081838729863179 | ArcticSecurity |
2021-10-22 19:16:37 | Zero Logon - I have just completed this room! Check it out: https://t.co/gEqYhWEh9X #tryhackme #CVE-2020-1472… https://t.co/g3QeuJIVxX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1451621108759867394 | kost_by |
2021-10-20 16:00:09 | One way to detect exploitation of CVE-2020-1472 is through Windows Security Event 4742 and Windows System Event 580… https://t.co/JdiytMrQhe https://twitter.com/i/web/status/1450853257677574155 | jkhalouian |
2021-10-20 13:10:17 | ZeroLogon (CVE-2020-1472) exploit used by a threat group utilizing Hancitor for initial access. ➡️Report out in a… https://t.co/YPESf9H1Va https://twitter.com/i/web/status/1450809036153131014 | TheDFIRReport |
2021-10-14 17:30:08 | Zero Logon - I have just completed this room! Check it out: https://t.co/mK2pg4p0ZL #tryhackme #CVE-2020-1472… https://t.co/OGsNr0G9Wm https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1448700292284010502 | martinbayard |
2021-10-13 21:30:05 | Zero Logon - I have just completed this room! Check it out: https://t.co/Bwye9RRdxz #tryhackme #CVE-2020-1472… https://t.co/o88aaxd5Yr https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1448399857400619015 | basti0220 |
2021-10-13 21:30:03 | Zero Logon - I have just completed this room! Check it out: https://t.co/spf7MDxiTS #tryhackme #CVE-2020-1472… https://t.co/9y0sE5gICX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1448400433672765441 | ihoruhe |
2021-10-11 15:50:10 | Zero Logon - I have just completed this room! Check it out: https://t.co/D7prYtbYFC #tryhackme #CVE-2020-1472… https://t.co/wSai9IEnNV https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1447589540990947330 | LCsTed |
2021-09-30 00:20:33 | Zero Logon - I have just completed this room! Check it out: https://t.co/2Mh1B2VZYs #tryhackme #CVE-2020-1472… https://t.co/mkwr3nmBf4 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1443367519725789192 | illustrioushefe |
2021-09-26 13:50:42 | Zero Logon - I have just completed this room! Check it out: https://t.co/qyw5wayWho #tryhackme #CVE-2020-1472… https://t.co/McR7OtHTH9 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1442124225146355713 | meneeither |
2021-09-23 13:00:11 | Zero Logon - I have just completed this room! Check it out: https://t.co/rVejC4dK6o #tryhackme #CVE-2020-1472… https://t.co/dhynYg2fzW https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1441023157343772675 | hakkiaucar |
2021-09-22 06:20:10 | Zero Logon - I have just completed this room! Check it out: https://t.co/9QAspNv0kz #tryhackme #CVE-2020-1472… https://t.co/yh8Kaw2RjB https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1440559568396767235 | mimilove_exe |
2021-09-22 03:50:37 | Zero Logon - I have just completed this room! Check it out: https://t.co/x4M0HNWLyx #tryhackme #CVE-2020-1472… https://t.co/dZjDjNGlbv https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1440521405435551744 | IlmanRI |
2021-09-22 02:31:19 | Just did an exploit for #zerologin CVE-2020-1472 and a pass-the-hash attack on a W2016 DC using Impacket. Song: Th… https://t.co/zTxviZfs1M https://twitter.com/i/web/status/1440501321442861061 | infinityABCDE |
2021-09-16 18:01:57 | Zero Logon - I have just completed this room! Check it out: https://t.co/WYuHOJqr97 #tryhackme #CVE-2020-1472… https://t.co/JzsbGqrxU8 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1438561767517560837 | MikeyBendz |
2021-09-15 02:40:09 | Zero Logon - I have just completed this room! Check it out: https://t.co/GaOP10pggp #tryhackme #CVE-2020-1472… https://t.co/mhs1Chd2QJ https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1437968961790959619 | packetwitcher |
2021-09-14 19:52:13 | Zero Logon - I have just completed this room! Check it out: https://t.co/8fmbePf4Pt #tryhackme #CVE-2020-1472… https://t.co/E6tlfiujvX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1437865935709380608 | InfoSecPhoenix |
2021-09-09 13:21:22 | Zero Logon - I have just completed this room! Check it out: https://t.co/yZ68jzh7Sn #tryhackme #CVE-2020-1472… https://t.co/QgTpjvp6FB https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1435955490543054849 | nvemb3r |
2021-08-31 15:30:10 | Zero Logon - I have just completed this room! Check it out: https://t.co/JFdkwgcRwm #tryhackme #CVE-2020-1472… https://t.co/CNxuyLcE8V https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1432726386150494211 | trblgc |
2021-08-31 14:30:08 | “Em um ano de vulnerabilidades e incidentes que se tornaram manchetes, o Zerologon (CVE-2020-1472) se destaca por s… https://t.co/pxasApB3oL https://twitter.com/i/web/status/1432710021297627137 | dansantanna |
2021-08-30 13:20:06 | Our Security Response Team highlighted #Zerologon (CVE-2020-1472) as one of the Top 5 Vulnerabilities of 2020.… https://t.co/zMoMl6A4jA https://twitter.com/i/web/status/1432331420626788352 | TenableSecurity |
2021-08-30 12:50:06 | In a year of headline-making vulnerabilities and incidents, Zerologon (CVE-2020-1472) stands out due to its widespr… https://t.co/JfGyo4a12k https://twitter.com/i/web/status/1432322719157129219 | Lexicon21 |
2021-08-27 13:02:44 | Zero Logon - I have just completed this room! Check it out: https://t.co/9WuCILfLXG #tryhackme #CVE-2020-1472… https://t.co/6Jtqg4UqHM https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1431237980568625161 | Cyb3rky |
2021-08-27 05:00:11 | Zero Logon - I have just completed this room! Check it out: https://t.co/S3XVa5m1rR #tryhackme #CVE-2020-1472… https://t.co/3Xl6IqFqTN https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1431118572328263683 | must4maa |
2021-08-26 20:20:18 | “Em um ano de vulnerabilidades e incidentes que se tornaram manchetes, o Zerologon (CVE-2020-1472) se destaca por s… https://t.co/7TDqMCvR26 https://twitter.com/i/web/status/1430987631886626816 | Art_Capella |
2021-08-22 02:50:05 | Zero Logon - I have just completed this room! Check it out: https://t.co/KBXcjFE5j8 #tryhackme #CVE-2020-1472… https://t.co/BDxSFalOHb https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1429272339045179463 | s3CuritYmatt3rs |
2021-08-19 19:10:19 | @UK_Daniel_Card Slight typo, the vendor for CVE-2020-1472 should be Microsoft. Netlogon is the CVE name. | douglasmun |
2021-08-19 17:10:15 | “If you have yet to install CVE-2020-1472 on your Windows servers, do so immediately... it will protect you from th… https://t.co/A4z9bQSPZN https://twitter.com/i/web/status/1428401456164519939 | FirstResponseEu |
2021-08-19 13:20:05 | Zero Logon - I have just completed this room! Check it out: https://t.co/vvRgRLFONw #tryhackme #CVE-2020-1472… https://t.co/L7eABBmCtz https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1428344347221708806 | MarcusChachuls1 |
2021-08-18 09:30:05 | In a year of headline-making vulnerabilities and incidents, Zerologon (CVE-2020-1472) stands out due to its widespr… https://t.co/Mt7Dx5dKTD https://twitter.com/i/web/status/1427925442263076864 | AlicePintori |
2021-08-13 10:50:05 | In a year of headline-making vulnerabilities and incidents, Zerologon (CVE-2020-1472) stands out due to its widespr… https://t.co/51LpFxZem1 https://twitter.com/i/web/status/1426131514798985220 | Art_Capella |
2021-08-10 10:50:22 | VoidSec/CVE-2020-1472: Exploit Code for CVE-2020-1472 aka Zerologon #Infosec via https://t.co/KDUhFaFE1M https://t.co/qVVImkA6Bc http://twinybots.ch https://github.com/VoidSec/CVE-2020-1472 | cornichecorp |
2021-08-09 11:40:25 | CVE-2020-1472: Exploit Code for CVE-2020-1472 aka Zerologon #infosec #pentest #redteam https://t.co/oSkeRCqStR https://t.co/Ndofel4LoM https://github.com/VoidSec/CVE-2020-1472 | CyberWarship |
2021-08-07 17:20:03 | On a recent pentest job for a client, i found a DC still vulnerable to Zerologon (CVE-2020-1472), it took around 15… https://t.co/xxhIjPNHts https://twitter.com/i/web/status/1424057245403426818 | zertux6 |
2021-08-07 03:00:11 | @SwiftOnSecurity Are you talking about CVE-2020-1472? Because it really sounds like you're talking about how MS us… https://t.co/naDhueUVvF https://twitter.com/i/web/status/1423839028613369858 | shugenja |
2021-08-06 15:20:05 | Эксплуатация CVE-2020-1472 Zerologon в Cobalt Strike.txt which explains how to use Beacon Object Files (designed to… https://t.co/26NJUuBdqf https://twitter.com/i/web/status/1423664395956232196 | KyleHanslovan |
2021-08-06 04:00:05 | Instructions for using CVE-2020-1472 Zerologon exploit through Cobalt Strike https://t.co/vqITVM7Uz7 | AuCyble |
2021-08-04 16:30:19 | Zero Logon - I have just completed this room! Check it out: https://t.co/zrexKIqcO3 #tryhackme #CVE-2020-1472… https://t.co/ORn4sBTozU https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1422957679249481729 | Kaushik02052914 |
2021-07-29 11:50:19 | CVE-2020-1472はVendor名がMSではなくNetlogonになってますね😅 Alert (AA21-209A) Top Routinely Exploited Vulnerabilities… https://t.co/ttIbKaAS5E https://twitter.com/i/web/status/1420711837411147777 | autumn_good_35 |
2021-07-29 10:20:06 | Windows Server用戶小心!PetitPotam漏洞恐讓攻擊者挾持AD網域 https://t.co/E2Xp0mUIeQ 針對網域控制器(DC)的弱點,一年前有Zerologon(CVE-2020-1472),一旦攻擊… https://t.co/Quoj6qcj7V https://www.ithome.com.tw/news/145919 https://twitter.com/i/web/status/1420689579795910661 | M157q_News_RSS |
2021-07-28 17:40:50 | CVE-2020-1472 ZeroLogon testing script A Python script that uses the Impacket library to test vulnerability for th… https://t.co/tADr1hvY8a https://twitter.com/i/web/status/1420436905297072140 | CyberWarship |
2021-07-26 21:40:40 | Zero Logon - I have just completed this room! Check it out: https://t.co/BFw7t6f9ta #tryhackme #CVE-2020-1472… https://t.co/4C7h8ekOsv https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1419770621224005643 | cnrd |
2021-07-25 17:00:07 | Zero Logon - I have just completed this room! Check it out: https://t.co/Te13S6qQGN #tryhackme #CVE-2020-1472… https://t.co/JXLDxGPulR https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1419339233123262467 | FoxtrotBugcrowd |
2021-07-21 13:50:45 | CVE-2020-1472 'Requires the latest impacket from GitHub with added netlogon structures.' #infosec #pentest… https://t.co/wIXj5NiPBI https://twitter.com/i/web/status/1417841806184783875 | CyberWarship |
2021-07-20 06:20:13 | Zero Logon - I have just completed this room! Check it out: https://t.co/os8C5j4Fc5 #tryhackme #CVE-2020-1472… https://t.co/mNqPJvk9PV https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1417366293410426891 | Cultiv8Resilync |
2021-07-17 14:10:06 | 6 CVEs Popular with Criminals: -CVE-2020-1472 (aka ZeroLogon) -CVE-2020-0796 (aka SMBGhost) -CVE-2019-19781 -CVE-2… https://t.co/6BQfeymr64 https://twitter.com/i/web/status/1416397813202624517 | z3r0trust |
2021-07-12 09:50:05 | Zero Logon - I have just completed this room! Check it out: https://t.co/2j55pYo9Z7 #tryhackme #CVE-2020-1472… https://t.co/CKe8hvIM5c https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1414520069183397895 | luizfernandorg |
2021-07-11 00:00:11 | Zero Logon - I have just completed this room! Check it out: https://t.co/7AezSCPbsP #tryhackme #CVE-2020-1472… https://t.co/3H7NCTVcJc https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1414010617271361536 | hildemarope |
2021-07-10 19:00:31 | Zero Logon - I have just completed this room! Check it out: https://t.co/gHEx9loYpM #tryhackme #CVE-2020-1472… https://t.co/d1aUOHVtXq https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1413935050098450435 | sudoneuron |
2021-07-09 12:31:32 | Zero Logon - I have just completed this room! Check it out: https://t.co/mhGr0VpT7H #tryhackme #CVE-2020-1472… https://t.co/gbOWyTNOK8 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1413474976548544516 | devil8731 |
2021-07-05 01:10:04 | Zero Logon - I have just completed this room! Check it out: https://t.co/clBR4eLZtC #tryhackme #CVE-2020-1472… https://t.co/SfeNgvwSGH https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1411853583046303747 | WsgSec |
2021-07-02 08:41:06 | There are 2911 deployments of Sonicwall SMA 200 firmware & 688 products with CVE-2020-1472 that are currently in us… https://t.co/RTf9uALxMn https://twitter.com/i/web/status/1410878550811594752 | CswWorks |
2021-06-29 04:20:05 | Zero Logon - I have just completed this room! Check it out: https://t.co/mcbihj0sCu #tryhackme #CVE-2020-1472… https://t.co/d1xDXiTv5r https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1409726322977427460 | xfavatax |
2021-06-24 03:20:04 | Zero Logon - I have just completed this room! Check it out: https://t.co/7HZZjHbmHF #tryhackme #CVE-2020-1472… https://t.co/11kJmeqiSO https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1407899287606943744 | 1NinjaRyder1 |
2021-06-22 22:30:13 | Zero Logon - I have just completed this room! Check it out: https://t.co/gjoDvEVEis #tryhackme #CVE-2020-1472… https://t.co/YoWCHbH7Sl https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1407465093407809540 | _glitchXR |
2021-06-17 12:59:14 | Zero Logon - I have just completed this room! Check it out: https://t.co/shHKatq85N #tryhackme #CVE-2020-1472… https://t.co/GjA4H30vth https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1405502893982203909 | DanDreadless |
2021-06-12 17:30:19 | Zero Logon - I have just completed this room! Check it out: https://t.co/piOMbPDJVj #tryhackme #CVE-2020-1472… https://t.co/fqOEKYrAxh https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1403764805673099274 | i_know_u_are |
2021-06-09 10:00:19 | Zero Logon - I have just completed this room! Check it out: https://t.co/AUWLqtqhpi #tryhackme #CVE-2020-1472… https://t.co/E7Lu1PQZze https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1402565983462645760 | EduardoEllery |
2021-06-02 21:50:03 | Zero Logon - I have just completed this room! Check it out: https://t.co/xnSfOenq59 #tryhackme #CVE-2020-1472… https://t.co/WJ7UpXb9Q7 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1400207640182022146 | DazBrownfield |
2021-05-27 00:39:26 | Zero Logon - I have just completed this room! Check it out: https://t.co/Z6apEpTN2T #tryhackme #CVE-2020-1472… https://t.co/qSZ72BhqgK https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1397654191091367941 | prjct_pi |
2021-05-21 03:00:12 | Zero Logon - I have just completed this room! Check it out: https://t.co/s66IUYiX7h #tryhackme #CVE-2020-1472… https://t.co/gqDe6zwyMD https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1395572967732568065 | elbee_ez |
2021-05-15 03:30:02 | i wish i can go back to the days where CVE-2020-1472 was trending on my feed and not this traumatic madness... https://t.co/Bdzdt1SozU | TebbaaX |
2021-05-12 22:00:02 | Zero Logon - I have just completed this room! Check it out: https://t.co/C31S1BGvtd #tryhackme #CVE-2020-1472… https://t.co/T8hk8mZ4US https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1392599857957937158 | D3faultS3tting |
2021-05-12 17:50:07 | Zero Logon - I have just completed this room! Check it out: https://t.co/C8zNn2D2S4 #tryhackme #CVE-2020-1472… https://t.co/MNkmdgtwxj https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1392536063885946880 | djeffnews |
2021-05-12 13:50:02 | @FireEye @Mandiant The screenshot shows CVE-2021-1472, but the report shows CVE-2020-1472 (zerologon). Is CVE-202… https://t.co/BSYMF4N1Va https://twitter.com/i/web/status/1392477137064583169 | bobbyinfosec |
2021-05-06 08:30:03 | Netlogon (Zerologon) Vulnerability (CVE-2020-1472): Improper implementation of AES-CFB8. Find out more on our artic… https://t.co/2SoVtpovst https://twitter.com/i/web/status/1390220888642105346 | SophiaCyber |
2021-05-02 19:00:13 | Zero Logon - I have just completed this room! Check it out: https://t.co/w9fBdfFr2q #tryhackme #CVE-2020-1472… https://t.co/q2GcYAQwLT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1388911992832995335 | PinguinRotten |
2021-05-02 08:00:04 | Zero Logon - I have just completed this room! Check it out: https://t.co/QvsXliXTPp #tryhackme #CVE-2020-1472… https://t.co/aW00VAgeYl https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1388764440972173313 | d3tm4r |
2021-05-01 23:10:07 | Zero Logon - I have just completed this room! Check it out: https://t.co/8ziFTamGGZ #tryhackme #CVE-2020-1472… https://t.co/LNcGRqTS76 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1388615789129961475 | lerchmirko |
2021-04-21 21:42:16 | Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472) - https://t.co/vntJqX2Ebu https://www.tenable.com/blog/oracle-april-2021-critical-patch-update-addresses-257-cves-including-zerologon-cve-2020-1472 | ka0com |
2021-04-18 20:00:04 | Day 34 of #100DaysOfHacking Worked on; ▶️Security+ videos @ProfessorMesser Completed; ✅CVE-2020-1472 Zerologon @RangeForce | dwambia |
2021-04-15 11:00:04 | CVE-2020-1472 in https://t.co/Z30KKC8KhK dotnet/AspNetCore #31831 https://t.co/cE7MUpom5Z http://mcr.microsoft.com/dotnet/core/aspnet:3.1-buster-slim https://github.com/dotnet/aspnetcore/issues/31831 | aspnetissues |
2021-04-10 13:40:04 | Packet sniffing, A brief overview on Zerologon exploit ( CVE-2020-1472 ), threat detection.... Learnt good stuff.… https://t.co/SlZu82lRm7 https://twitter.com/i/web/status/1380877360849854466 | Blankeyezero |
2021-04-09 02:10:03 | Day 11 of #100DaysOfHacking ✅Core Windows Processes @RealTryHackMe ✅CVE-2020-1472 Zerologon @RangeForce ▶️Sec+… https://t.co/2bde5n3YuB https://twitter.com/i/web/status/1380340611899928577 | DKHInfosec |
2021-04-05 21:20:09 | Zero Logon - I have just completed this room! Check it out: https://t.co/3YKkDI2p6f #tryhackme #CVE-2020-1472… https://t.co/qSLnMu3vzu https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1379179696634617856 | DKHInfosec |
2021-04-01 00:20:04 | CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker es... https://t.co/2GZi59pRPt Cust… https://t.co/2QjWL3yrfe http://vulmon.com/vulnerabilitydetails?qid=CVE-2020-1472 https://twitter.com/i/web/status/1377414322448523269 | VulmonFeeds |
2021-03-26 20:00:05 | Alerta sobre a vulnerabilidade CVE-2020-1472 no protocolo #Netlogon, apelidado de #Zerologon. https://t.co/JaHAQ2jShK https://bit.ly/3d9foFN | EChavarro |
2021-03-25 01:00:03 | 2020 年 8 月 に修正パッチがリリースされた後もエクスプロイトが続いているCVE-2020-1472(ZeroLogon 脆弱性)。 BlackBerry インシデント対応(IR)チームが発見したランサムウェアのデプロイに… https://t.co/orRxGtQDGQ https://twitter.com/i/web/status/1374888765240451075 | BlackBerryJPsec |
2021-03-22 19:10:04 | @mubix CVE-2020-1472 not a bad post-exploitation type example | johnjhacking |
2021-03-16 07:00:02 | Last update needed for Zerologon, finally available » CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to En… https://t.co/FxfkjqrnJW https://twitter.com/i/web/status/1371716706142457856 | reverseame |
2021-03-05 16:40:10 | Zero Logon - I have just completed this room! Check it out: https://t.co/LxTOCnTPow #tryhackme #CVE-2020-1472… https://t.co/yeXFfmdqsY https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1367877036468039680 | JarrodR87 |
2021-03-02 19:01:16 | Zero Logon - I have just completed this room! Check it out: https://t.co/ukok1lRWhK #tryhackme #CVE-2020-1472… https://t.co/Rn034m3cLy https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1366823351751237636 | n0rdvallt |
2021-03-01 20:10:26 | Suite au patch CVE-2020-1472 de Microsoft le mount cifs linux ne fonctionne plus au niveau de l'authentification. Q… https://t.co/wEDKMmpfsU https://twitter.com/i/web/status/1366480516103491586 | spiwit |
2021-02-28 13:40:11 | whoops ~ I just published #Zerologon CVE-2020-1472?? Easy Way To Take Over Active Directory (Exploitation) https://t.co/h3F32AuaP3 https://link.medium.com/IxVpuIdSeeb | evanald__ |
2021-02-25 18:48:33 | Zero Logon - I have just completed this room! Check it out: https://t.co/xFw2SrJvRY #tryhackme #CVE-2020-1472… https://t.co/M0FFL50o03 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1364651782945800193 | huey_4 |
2021-02-25 17:11:31 | Zero Logon - I have just completed this room! Check it out: https://t.co/xFw2SrJvRY #tryhackme #CVE-2020-1472… https://t.co/M0FFL50o03 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1364651782945800193 | huey_4 |
2021-02-25 01:01:13 | CVE-2020-1472 aka Zerologon Is very effective on domain controllers, using the Netlogon Remote Protocol (MS-NRPC),… https://t.co/jDG4M8FH9G https://twitter.com/i/web/status/1364740163763544064 | 1337in |
2021-02-24 17:01:09 | Netlogon secure channel, CVE-2020-1472 … problemas https://t.co/Kpo8ZsOQvo http://www.mundosysadmin.com/netlogon-secure-channel-cve-2020-1472-problemas/ | b0fh3r_666 |
2021-02-21 18:30:09 | @virtualmanc This would have been caused by the Feb updates patching CVE-2020-1472 https://t.co/U8FBuYujdB https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472 | dips_nk |
2021-02-19 14:50:09 | A security firm named Secura has published a white paper of a vulnerability (CVE-2020-1472) affecting Microsoft's… https://t.co/9YvjAHLDRh https://twitter.com/i/web/status/1362775783136231427 | secforeveryone |
2021-02-19 01:10:08 | Spiffy Zerologon (CVE-2020-1472): SentinelOne First to Detect on the Endpoint https://t.co/iijT5GGRtk via @YouTube https://youtu.be/SqqZSDTNgTw | Wayne_Bridgeman |
2021-02-16 21:40:03 | refresh.. CVEs: 45 includes: sudo CVE-2021-3156 smb/netlogon CVE-2020-1472 | awatkins1966 |
2021-02-15 20:50:20 | Shared: Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) | CI… https://t.co/Tpd6AhbwQ0 https://twitter.com/i/web/status/1361415235781816325 | WinObs |
2021-02-14 15:00:05 | CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/pYqBiiGwnx http://ow.ly/x8Ce102zaDo | AlicePintori |
2021-02-14 11:00:03 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/Fm67Ax0nMI https://support.microsoft.com/en-us/topic/how-to-manage-the-changes-in-netlogon-secure-channel-connections-associated-with-cve-2020-1472-f7e8cc17-0309-1d6a-304e-5ba73cd1a11e | peterwestra |
2021-02-12 18:30:55 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2021-02-12 13:00:14 | 今月はシステム管理者にとって胃が痛い月になるかな。 2月Microsoft月例パッチをADサーバに当てるとCVE-2020-1472の対策が強制されて、事前に緩和対策してない古い非準拠デバイスがAD認証できなくなる。 去年の8月か… https://t.co/gsQOPUqZFg https://twitter.com/i/web/status/1360210546155347968 | AmagaeruPurple |
2021-02-12 13:00:05 | CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default #CyberRisk… https://t.co/e1FtGC0Y09 https://twitter.com/i/web/status/1360211808661868544 | 1Ivango1 |
2021-02-11 18:30:06 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2021-02-11 17:00:03 | Happy Chinese New Year! Just found out that the final patch for CVE-2020-1472 was released this week, this mitiga… https://t.co/I2DyaivTGc https://twitter.com/i/web/status/1359909356981092361 | edwardzpeng |
2021-02-11 14:20:06 | Microsoft addressed a critical remote code execution vulnerability affecting the Netlogon protocol (CVE-2020-1472)… https://t.co/mmD4R292A5 https://twitter.com/i/web/status/1359868196866715655 | papervote |
2021-02-11 14:10:05 | Hello Twitter, des avis sur le deuxième correctif CVE-2020-1472 #ZeroLogon ? Il est urgent ou pas du coup ? J'avoue être dubitatif ... | BaptisteD4V1D |
2021-02-11 12:50:07 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) #Anonymous https://t.co/1olrmpbPWt https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472 | AnonAnonymous |
2021-02-11 09:40:03 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472):… https://t.co/y39govOYB7 https://twitter.com/i/web/status/1359798440012709888 | KeoXes |
2021-02-11 07:20:03 | Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) addresed, so beginning February… https://t.co/4D6ELHz0re https://twitter.com/i/web/status/1359761885034393600 | EloySalamancaR |
2021-02-11 07:10:05 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/EBVcOpm3Ea https://twitter.com/i/web/status/1359759332641026048 | cyberdian_cert |
2021-02-11 05:30:04 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/fEF2H2VNrg https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-code | meknowhu |
2021-02-11 04:30:03 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/bpA8QoHPvQ https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-code | RRalstonAgile |
2021-02-11 00:50:57 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) - https://t.co/txwowBbG3O https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-code | moton |
2021-02-11 00:11:52 | 【ニュース】zerologonに対処する最終段階のパッチがリリース ・非セキュアなRPC通信ができなくなる「強制モード」が有効に ・CVEは「CVE-2020-1472」 ・システム担当者は非セキュア通信をしている端末がないか要… https://t.co/8POmoEBENk https://twitter.com/i/web/status/1359653908423929856 | BlogLoki |
2021-02-10 22:30:07 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/Ki6OxD3yWw https://twitter.com/i/web/status/1359630729571934217 | SecureNetIT |
2021-02-10 22:12:41 | #Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/bdFZdYVqDs https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-code | Sec_Cyber |
2021-02-10 21:52:15 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) Original rel… https://t.co/F0tluSjHiQ https://twitter.com/i/web/status/1359618632549081093 | InfoSecHotSpot |
2021-02-10 21:42:55 | US-CERT - Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/4ZSdln9phH https://ift.tt/3rCW21B | buzz_sec |
2021-02-10 21:40:16 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/fPslSI8Bbp https://content.govdelivery.com/bulletins/gd/USDHSCISA-2c092e3/ | MiniTuxedo |
2021-02-10 21:22:24 | Microsoft addressed a critical remote code execution vulnerability affecting the Netlogon protocol (CVE-2020-1472)… https://t.co/yzCZ4m0LY7 https://twitter.com/i/web/status/1359610643448532995 | drwareinc |
2021-02-10 21:12:08 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/myTkcACJyO https://www.itsecuritynews.info/microsoft-launches-phase-2-mitigation-for-netlogon-remote-code-execution-vulnerability-cve-2020-1472/ | IT_securitynews |
2021-02-10 21:12:02 | Microsoft’s #PatchTuesday update included Phase 2 mitigation of CVE-2020-1472, enabling Domain Controller enforceme… https://t.co/A3veSL8XUO https://twitter.com/i/web/status/1359609418669842433 | USCERT_gov |
2021-02-10 21:10:34 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/sNSAwyhWnu https://www.drware.com/microsoft-launches-phase-2-mitigation-for-netlogon-remote-code-execution-vulnerability-cve-2020-1472/ | drwareinc |
2021-02-10 21:01:14 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/aYYlCSH3Ga https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-code | gregoryfarley |
2021-02-10 20:52:08 | #Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/TlmplQ2oZC https://bit.ly/374Cj34 | blu3cloak |
2021-02-10 20:41:44 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/PDQWgcbcHw https://sl.advdat.com/3qaYRXd | ADVDAT_OH |
2021-02-10 20:41:30 | CERT Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/KOHYTB64FF https://bit.ly/371KQDX | PAUL_CSFI |
2021-02-10 20:41:17 | BOLO: Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/IErVxuSqp9 https://twitter.com/i/web/status/1359601267425898505 | Inceptus3 |
2021-02-10 20:41:12 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/0VWXSeiyWN https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-code | security_inside |
2021-02-10 20:31:43 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/lnJADv5zX3 https://twitter.com/i/web/status/1359599024542650370 | AcooEdi |
2021-02-10 20:31:17 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/w7pokegJwj https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-code?utm_source=dlvr.it&utm_medium=twitter | corq |
2021-02-10 20:30:21 | Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/X7L8CELSQE https://twitter.com/i/web/status/1359599896203059208 | ATTOGTech |
2021-02-10 20:30:07 | #infosec Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/4T2Alq4Mi9 https://ift.tt/2Z1im8K | jeffreydbrown |
2021-02-10 18:41:52 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2021-02-10 18:30:06 | Reminder: February is the enforcement patch installation of #zerologon CVE-2020-1472 #BlueTeam #PatchTuesday #infosec #CyberSecurity | WeisterCreek |
2021-02-10 16:34:18 | CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/JejZfRJ52f http://ow.ly/SQKe102yNY6 | Patent_4405829 |
2021-02-10 12:20:55 | CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/Ej7WfQ8pTR http://ow.ly/sbj2102yLW7 | Art_Capella |
2021-02-10 08:20:28 | CVE-2020-1472 #Compliance Baseline with #MEMCM $EventId = 5827,5828,5829,5830,5831 $log = Get-WinEvent -FilterHash… https://t.co/vDrVxYnGsa https://twitter.com/i/web/status/1359416086526050305 | GENICTCOM |
2021-02-10 06:40:05 | CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/HYf1KEFXak https://www.tenable.com/blog/cve-2020-1472-microsoft-finalizes-patch-for-zerologon-to-enable-enforcement-mode-by-default | opexxx |
2021-02-10 03:00:07 | 承前) ・CVE-2020-1472 (Netlogon) は、予定通り、今月公開したセキュリティ更新プログラムを適用することで強制モードが有効に。 | ka0com |
2021-02-10 03:00:04 | CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/Z0IGAro64O https://www.tenable.com/blog/cve-2020-1472-microsoft-finalizes-patch-for-zerologon-to-enable-enforcement-mode-by-default | ka0com |
2021-02-10 01:01:41 | 最後に今月はZerlogon (CVE-2020-1472 -)への対処として安全なNetlogonを強制が実施。2月のパッチをDCに適用すると準拠しないNetlogon接続は拒否するようになる。 https://t.co/lAC9Jt3ScB https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | EurekaBerry |
2021-02-10 01:01:33 | なお、ADへの脆弱性対処強制はあと2つ予定されている。2月に強制予定だった CVE-2020-16996 は3月に延期。あとひとつ CVE-2020-1472 への対処強制が5月に予定されています。AD管理者の方はあらためてご確認を | EurekaBerry |
2021-02-09 19:41:34 | Netlogon is placed in enforcement mode all devices w/today's new patch for CVE-2020-1472. Resources:… https://t.co/ZwCLPP2Y7N https://twitter.com/i/web/status/1359223209573441537 | GossiTheDog |
2021-02-09 10:50:03 | Zero Logon - I have just completed this room! Check it out: https://t.co/bwLcJJitQP #tryhackme #CVE-2020-1472… https://t.co/0isuT7O4PZ https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1359092024495009792 | edoardottt2 |
2021-02-08 22:10:39 | Zero Logon - I have just completed this room! Check it out: https://t.co/94rLO7bv2n #tryhackme #CVE-2020-1472… https://t.co/PEqyU7vXZE https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1358887510257127425 | m0hamm3dx00 |
2021-02-07 20:00:04 | Zero Logon - I have just completed this room! Check it out: https://t.co/i2FoE44LRG #tryhackme #CVE-2020-1472… https://t.co/h1z5oJsxUk https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1358505428259340289 | Muldwych |
2021-02-05 23:30:10 | CVE-2020-1472(Zerologon): Poco queda por decir de esta vulnerabilidad, que parecía que iba a ser la última gran not… https://t.co/mmIavQvlmY https://twitter.com/i/web/status/1357833286643499011 | grevelo1 |
2021-02-04 23:52:48 | #Microsoft has warned us that that on Feb. 9th patches will enforce CVE-2020-1472 #Windows7 PCs to have an issue co… https://t.co/1ZvcRXQEWe https://twitter.com/i/web/status/1357472189402914825 | TheFulcrumGroup |
2021-02-01 15:00:04 | Get Zerlologons CVE-2020-1472 using #PowerShell: https://t.co/gRPr0vDCO2 #vulnerability #microsoft http://directoryadmin.blogspot.com/2020/12/get-zerlologons-cve-2020-1472-using.html | directoryadmin |
2021-01-28 00:00:37 | Microsoft addressed a Critical RCE vulnerability affecting the Netlogon protocol (CVE-2020-1472) on August 11, 2020… https://t.co/l05aRlIY02 https://twitter.com/i/web/status/1354578333439287296 | NSGHELP |
2021-01-27 09:40:52 | Zero Logon - I have just completed this room! Check it out: https://t.co/Ow4MXX8Fba #tryhackme #CVE-2020-1472… https://t.co/Y9asxjhas2 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1354361358817452032 | yg_chappie |
2021-01-24 06:40:10 | CVE-2020-1472 - Zerologon Exploit POC #Zerologon #Exploit #CVE-2020-1472 #CyberSecurity #DataCenterHack #RedTeam… https://t.co/yZR397j4NB https://twitter.com/i/web/status/1353230530955735047 | reconshell |
2021-01-23 03:40:04 | おお、AD脆弱性[CVE-2020-1472]、通称ZerologonのStep2(安全でないRPC接続の強制切断)は2/9以降でパッチ配布とな。完全に忘れておった。。。 | Le7Wy |
2021-01-22 14:10:17 | New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/wH8GLNnxZ7 https://lnkd.in/e6C57pU | AAairom |
2021-01-21 09:51:12 | 📌Microsoft Zerologon Zafiyeti‼️ Microsoft, 9 Şubat tarihinden itibaren CVE-2020-1472 numaralı Zerologon zafiyetini… https://t.co/TnFSqGO5PF https://twitter.com/i/web/status/1352190657822138368 | UITSEC |
2021-01-21 09:50:48 | ⚠️ Upcoming #ActiveDirectory security update of February 9! 🛡️ The 2nd phase of the #ZeroLogon (CVE-2020-1472) miti… https://t.co/OIMmxbRJo1 https://twitter.com/i/web/status/1352191446665846785 | cnotin |
2021-01-21 07:01:10 | Be prepared to the February 9 #Security Update, #Zerologon, CVE-2020-1472 https://t.co/OucTKARM7G #Microsoft… https://t.co/ODNHUSOsKf https://msrc-blog.microsoft.com/2021/01/14/netlogon-domain-controller-enforcement-mode-is-enabled-by-default-beginning-with-the-february-9-2021-security-update-related-to-cve-2020-1472/ https://twitter.com/i/web/status/1352147653350608896 | jeanclaudebpro |
2021-01-20 13:40:04 | 非準拠クライアントなヤツ / “[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 – Microsoft Security Response Center” https://t.co/MN54tjdvIN https://htn.to/3QE1u8RiJe | waiha8 |
2021-01-18 12:50:03 | Will cause some fun for those ignoring this exploit CVE-2020-1472 #Zerologon flaw. https://t.co/9zOTsalm97 https://threatpost.com/microsoft-implements-windows-zerologon-flaw-enforcement-mode/163104/ | lmeyler |
2021-01-18 03:21:06 | Zero Logon - I have just completed this room! Check it out: https://t.co/lLdxSEdW8d #tryhackme #CVE-2020-1472… https://t.co/5vRqopdZDs https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1350738074880249858 | gunjin1 |
2021-01-17 18:40:05 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2021-01-16 18:30:06 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2021-01-15 21:50:08 | #Microsoft warn admins that #Zerologon (CVE-2020-1472) #vulnerability update will transition into the enforcement p… https://t.co/BusyCjhex5 https://twitter.com/i/web/status/1350197325340303368 | twelvesec |
2021-01-15 18:30:06 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2021-01-15 15:40:03 | Microsoft Reminds Organizations of Upcoming Phase in Patching Zerol... (Securityweek) Tracked as CVE-2020-1472 and… https://t.co/BeuwjqszuP https://twitter.com/i/web/status/1350104887497875456 | InfoSec_b |
2021-01-15 10:00:03 | Start by bookmarking these technical guides: 1️⃣ How to use vuln chaining to exploit #Zerologon (CVE-2020-1472):… https://t.co/a3QLjmvFQ5 https://twitter.com/i/web/status/1350018832233082880 | pentesttoolscom |
2021-01-15 07:30:03 | MSFT addressed a Critical RCE vuln affecting Netlogon (CVE-2020-1472) on Aug 11 2020. Reminder that beginning with… https://t.co/55VNWqLza5 https://twitter.com/i/web/status/1349981856016470016 | holisticinfosec |
2021-01-15 02:50:02 | 【ニュース】 ・CVE-2020-1472の第2弾アップデートについて、MSより記事公開 Netlogon Domain Controller Enforcement Mode is enabled by default beg… https://t.co/dZg760q2Gx https://twitter.com/i/web/status/1349910536373239808 | BlogLoki |
2021-01-15 00:30:02 | NetApp ONTAP 8.2.x 7-modeで使い続けている環境はActive Directoryサーバに2月適用予定のnetloginのセキュアチャネルに関する脆弱性CVE-2020-1472の修正が適用されるとアクセスで… https://t.co/cTjnZoSCRp https://twitter.com/i/web/status/1349875920690036738 | osakanataro2 |
2021-01-13 11:00:12 | I had some spare time and decided to automate for some known CVE's. The first is ZeroLogOn (CVE-2020-1472) Would y… https://t.co/aTE31FGVQs https://twitter.com/i/web/status/1349308896960241666 | avitansahar |
2021-01-13 03:22:59 | CVE-2020-1472 対応パッチを当てるにはWindows Server 2012以降でないといけない(例の延長サポートなしの場合) > Windows Server 2012のAD最低の機能レベルは2003 > ま、まさか… https://t.co/MrjaiaPo0x https://twitter.com/i/web/status/1349190099397865473 | g_plains |
2021-01-13 01:01:23 | 来月AD環境への重要な設定変更の更新が3つ有り:AD管理者の方は改めて環境の準備のご確認をお願いします:変更①2020年8月に修正を公開したCVE-2020-1472 Netlogon (Zerologon)への対応として安全な… https://t.co/CRaEAgKlJv https://twitter.com/i/web/status/1349156979357282304 | EurekaBerry |
2021-01-12 09:40:04 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/if1Tt37KgF #InfoSec #CyberSecurity #ZeroLogon #Netlogon #CVE #Windows https://blog.zsec.uk/zerologon-attacking-defending/ | s3xcur1ty |
2021-01-11 17:40:23 | Zerologon : Instantly Become Domain Admin by Subverting Netlogon Cryptography (CVE-2020-1472) : https://t.co/WgkHTYkMTw https://aeternusmalus.wordpress.com/2021/01/11/zerologon-instantly-become-domain-admin-by-subverting-netlogon-cryptography-cve-2020-1472/ | Djinn3301 |
2021-01-11 16:50:09 | Zerologon : Instantly Become Domain Admin by Subverting Netlogon Cryptography (CVE-2020-1472) :… https://t.co/IAKJQJv4fs https://twitter.com/i/web/status/1348672721790541824 | binitamshah |
2021-01-08 17:10:10 | https://t.co/Lw9zFPoCR1 Actual footage of Tom Tervoort fucking finding CVE-2020-1472. What an actual fucking mad lad. https://youtu.be/AcmaNJfRQf0 | gir489 |
2021-01-08 09:20:06 | Does anyone know if CVE-2020-1472 is public yet? I don’t want to pay $500 in Monero to see this exploit. It’s bad but it’s not $500 bad. | gir489 |
2021-01-07 13:10:04 | Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range #splunkBlogs | hernanespinoza |
2021-01-06 19:10:06 | ثريد عن ثغرة Zerologon : Unauthenticated domain controller ( CVE-2020-1472) الثغرة تصيب: Netlogon Rmote protoco… https://t.co/ZLNMDz8Swr https://twitter.com/i/web/status/1346894672237633546 | 0xFahad |
2021-01-05 07:40:02 | 去年公開された脆弱性の話なので忘れられていると思いますが、2 月の Windows Update で以下が強制フェーズに移行するので管理者の皆々様におかれましてはお気をつけくださいますよう - CVE-2020-1472 (Ne… https://t.co/YDtRMIS3AY https://twitter.com/i/web/status/1346359850318458882 | Liliaceae |
2021-01-03 18:40:03 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2021-01-03 16:00:04 | Hack into windows server 2012 R2 domain controller without password by exploiting CVE-2020-1472 (CVSS rating 10/10)… https://t.co/YC5R3ILzQp https://twitter.com/i/web/status/1345760144899104775 | WrathfulDiety |
2021-01-02 19:40:02 | @SolarisUpdate, CVE-2020-1472. Solaris 11 ZFS SMB is not compliant and will be disallowed from connecting to AD af… https://t.co/z2kj2VJbPe https://twitter.com/i/web/status/1345453768658145280 | cmdr112a |
2021-01-02 17:10:03 | In August a patch was released for CVE-2020-1472 (ZeroLogon), in September technical details were released by… https://t.co/mCqEb3Dmrb https://twitter.com/i/web/status/1345416520441221121 | cglyer |
2021-01-01 16:20:04 | 2020/09 - ドコモ口座の不正出金 - ゆうちょ銀行でも不正出金 - Zerologon(CVE-2020-1472)でざわつく - BSいきものがかり DIGITALFES2020、よかったが音楽番組との違いはどこか感 -… https://t.co/TsSuQC1qJ4 https://twitter.com/i/web/status/1345041207659876352 | hijili2 |
2020-12-27 22:10:03 | CVE-2020-1472 : ZeroLogon https://t.co/KE3zh41kvo @100security #100security https://t.co/Ek3ow1HYbU https://www.100security.com.br/cve-2020-1472 | 100Security |
2020-12-24 17:20:03 | CVE-2020-1472への対応しなくちゃとマイクロソフトのサイトを何度読んでも、 ぜんっぜんどんな悪用ができるのか意味わかんなかったけど、 この説明見たらやばい脆弱性だってようやく分かった (´-﹏-`;)やだなぁ https://t.co/75NVgm8Onf https://twitter.com/fwarashi/status/1308434823682244608 | kiryuumomoka |
2020-12-22 15:10:13 | A critical vulnerability has been found in the #Netlogon Remote Protocol (MS-NRPC) (CVE-2020-1472) and can be explo… https://t.co/CSNP6tF8ox https://twitter.com/i/web/status/1341398093460348928 | certbe |
2020-12-22 15:10:13 | Une vulnérabilité critique a été trouvée pour #Netlogon Remote Protocol (MS-NRPC) (CVE-2020-1472) et peut être expl… https://t.co/KCB6ehRPQi https://twitter.com/i/web/status/1341398092650663937 | certbe |
2020-12-22 15:00:03 | Een kritieke kwetsbaarheid is gevonden in the #Netlogon Remote Protocol (MS-NRPC) (CVE-2020-1472) en kan misbruikt… https://t.co/rmcpGM6ePt https://twitter.com/i/web/status/1341398091740696586 | certbe |
2020-12-20 17:00:03 | Don't think that #pay2key are expert or talented, they used Zerologon vulnerability (CVE-2020-1472) to access the I… https://t.co/Yy3YG1YF3i https://twitter.com/i/web/status/1340702660022968320 | EmbeddedOle |
2020-12-14 14:40:05 | CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/sgveHHDlli @YouTubeより もう少しで100高評価…ッ! https://t.co/6ePxFGDFbo https://youtu.be/1h_wlMWwyB4 | fwarashi |
2020-12-14 10:10:07 | Yerel ağ sızma testi uzmanları için iyi, sistemciler için ise kötü bir haber: CVE-2020-1472. İlgili zafiyet ile bir… https://t.co/sjBtawgdf5 https://twitter.com/i/web/status/1338423601477902336 | dailypentest |
2020-12-13 09:00:08 | Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/IvjbLnXBio #InfoSec… https://t.co/0i562CGOwK https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html https://twitter.com/i/web/status/1338044893181177856 | s3xcur1ty |
2020-12-10 23:14:08 | IPS:15156 Windows Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) 2 IPS:15158 Windows Netlogon Elevat… https://t.co/VWG3859URc https://twitter.com/i/web/status/1337171848706998277 | BRChelmo |
2020-12-09 21:20:44 | @hkashfi Who cares about DC vulnerabilities? In any case, Organizations are still vulnerable to CVE-2020-1472. | ho_lajevardi |
2020-12-09 19:40:12 | #zerologon CVE-2020-1472 @PwnieAwards 2020 Best Cryptographic Attack https://t.co/tVbsb06Mwx https://t.co/VpQAXlk112 https://pwnies.com/winners/ | daniel_bilar |
2020-12-09 13:10:05 | CVE-2019-11510 CVE-2020-1472 CVE-2018-13379 CVE-2018-15961 CVE-2019-0604 CVE-2019-0708 CVE-2019-11580 CVE-2019-1978… https://t.co/K86lEXNX7S https://twitter.com/i/web/status/1336658551100616704 | brunoagostinho |
2020-12-09 10:00:19 | Listado de CVEs por orden de criticidad: CVE-2019-11510 CVE-2020-1472 CVE-2018-13379 CVE-2018-15961 CVE-2019-0604… https://t.co/NgMpiAriDK https://twitter.com/i/web/status/1336609174692704258 | AlvaroVallega_ |
2020-12-09 00:10:03 | AD Security Experts; Once you move to enforcement mode for secure RPC for CVE-2020-1472, does 'restrictions for una… https://t.co/qcDthnDxxP https://twitter.com/i/web/status/1336462915923152897 | DXPetti |
2020-12-09 00:10:02 | CVE-2020-1472 details: https://t.co/JP15IT1s6n https://support.microsoft.com/en-au/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | DXPetti |
2020-12-08 14:40:06 | Zerologon(CVE-2020-1472)のpcapファイルからはジュゴーン(みず)が召喚された。 脆弱性の破壊力の割に、召喚されたモンスターは弱っちい。 https://t.co/py42RNDq74 | v_avenger |
2020-12-08 14:40:05 | CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/sgveHHDlli @YouTubeより 隙きあらば宣伝 https://t.co/tGPLd1nYTN https://youtu.be/1h_wlMWwyB4 https://twitter.com/fwarashi/status/1336317642328567808 | fwarashi |
2020-12-06 20:50:03 | ZeroLogon Exploit - Abusing CVE-2020-1472 (Way Too Easy!) https://t.co/xBp1EC7LQw https://www.youtube.com/watch?v=6xMGsdD-ArI | Ibraheem_111 |
2020-12-06 16:10:03 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/vusOL9XXM2 https://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.html | vjgils |
2020-12-06 16:10:02 | Ataques de #Zerologon Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/vusOL9XXM2 https://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.html | vjgils |
2020-12-05 02:30:17 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/x1BMEbjpXy http://dlvr.it/Rn1mzS | d_a_gallardo |
2020-12-04 11:20:20 | Durante este taller, el profesor e investigador nos explica los detalles de la #vulnerabilidad CVE-2020-1472, descr… https://t.co/Zp70VGLXJv https://twitter.com/i/web/status/1334818867940646912 | CCNCERT |
2020-12-03 15:42:23 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/4kE92wZydT http://dlvr.it/RmwX0C | profesortech |
2020-12-03 10:00:08 | ⚠️ رول اسپلانک جهت تشخیص حمله مبتنی بر آسیب پذیری Zerologon شناسه آسیب پذیری CVE-2020-1472 شرح آسیب پذیری: با سو ا… https://t.co/O6PRUeGO2X https://twitter.com/i/web/status/1334435724939051008 | Forcedalas |
2020-12-03 09:50:09 | ZeroLogon Exploit Windows CVE-2020-1472 https://t.co/Idx1niQkjf https://m.youtube.com/watch?v=6xMGsdD-ArI | Forcedalas |
2020-12-03 00:50:06 | CVE-2020-1472 / USN-4559-1 | redkepeng |
2020-12-02 19:40:08 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/qzaAdhxz8j https://buff.ly/3g2Y8mY | nicoboettcher |
2020-12-02 18:30:25 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-12-02 09:00:12 | Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/7FxRfBLh16 #InfoSec… https://t.co/enJAPEnqZU https://github.com/dirkjanm/CVE-2020-1472 https://twitter.com/i/web/status/1334058761485508608 | s3xcur1ty |
2020-12-02 08:11:12 | #earmas RT SeguInfo: Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/bFKS82YVf5 https://j.mp/3lsCYzt | ApostolWario |
2020-12-02 08:01:53 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/QZBHLFPVGl http://ow.ly/bYxK30rmIpl | DYSTEC |
2020-12-01 23:20:07 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472. https://t.co/d9XtChXPcI https://t.co/duycsUZGVE https://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.html | DragsterSystems |
2020-12-01 22:30:49 | “Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472” https://t.co/RoUXcnTfzt v… https://t.co/2AVp4XYhYy https://buff.ly/3mv8KNB https://twitter.com/i/web/status/1333898864059932672 | nethome_mx |
2020-12-01 19:30:29 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/vmm8K6O6lq http://feedproxy.google.com/~r/NoticiasSeguridadInformatica/~3/v0-ctIFQtH4/ataques-de-zerologon-tomar-accion.html | jccall80 |
2020-12-01 19:22:38 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/E3oX2x8jzG… https://t.co/cIrDuFGiNK https://buff.ly/2Vnp9I3 https://twitter.com/i/web/status/1333851107953676291 | Jimenezsgbriela |
2020-12-01 18:30:39 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/0oY8qLbRbS http://dlvr.it/RmnZcX | vjgils |
2020-12-01 18:20:17 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/neV4woC9E2 http://dlvr.it/RmnXsq | pierregb |
2020-12-01 18:20:07 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/dXCoZnde3R http://dlvr.it/RmnYVJ | M3XT4R |
2020-12-01 18:11:47 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/6lM7Ou60cR http://dlvr.it/RmnVhF | romer_u |
2020-12-01 18:11:43 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/vSYp1NsRhj https://j.mp/3lsCYzt | SeguInfo |
2020-12-01 17:50:22 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/bQuIxI1gA9 http://dlvr.it/RmnRl0 | w00z_ |
2020-12-01 17:20:08 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/2P0C3f5y1t http://dlvr.it/RmnMmD | jesusMamoros |
2020-12-01 17:10:03 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/SnVsaNtakT http://dlvr.it/RmnLPp | victor_hglz |
2020-12-01 16:57:53 | Seguinfo: Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/VjnOO2iiSZ https://ift.tt/2VnblNL | Seguridadula |
2020-12-01 16:53:41 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/OYh9Iva5FO http://dlvr.it/RmnGDn | BringITON_CA |
2020-12-01 16:30:19 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/DbzEE5iAEO https://t.co/L66dbMoIUF https://ift.tt/2VnblNL | Microhardpc |
2020-12-01 16:30:11 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/gVExjxKd2N http://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.html | Sociabilidad |
2020-12-01 16:20:27 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/1h521Odo5W https://ift.tt/2VnblNL | edcamposj |
2020-12-01 16:00:21 | [Recomendado]Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472… https://t.co/1NHiimkV5L https://twitter.com/i/web/status/1333801539480109068 | seguridad_si |
2020-12-01 16:00:15 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/2FCp0EimoW https://ift.tt/2VnblNL | 3m1l |
2020-12-01 16:00:09 | Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/VUPsjrCbWX via @seguinfo #InfoSec http://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.html | th3hutt |
2020-12-01 09:00:12 | “If you have yet to install CVE-2020-1472 on your Windows servers, do so immediately” warns Dominic Bland “It will… https://t.co/NvPY0ja6aH https://twitter.com/i/web/status/1333696095197802497 | FirstResponseEu |
2020-12-01 00:50:06 | CVE-2020-1472 Netlogonの脆弱性、通称「Zerologon」をMicrosoft Defender で検出して対応可能に:https://t.co/b29L4lkWSX https://www.microsoft.com/security/blog/2020/11/30/zerologon-is-now-detected-by-microsoft-defender-for-identity/ | EurekaBerry |
2020-11-30 23:00:38 | There's been a lot of focus on ZeroLogon (the recently patched CVE-2020-1472). Learn about how Microsoft Defender f… https://t.co/XXDGGA3aN9 https://twitter.com/i/web/status/1333544318858973184 | MSThreatProtect |
2020-11-26 18:50:15 | 「CVE-2020-1472 Netlogon の特権の昇格の脆弱性」の対応のためにドメインコントローラーに順次パッチを適用中。 Windows Server 2012以降は問題なし。 しかしWindows Server 200… https://t.co/GKpbeLDHXE https://twitter.com/i/web/status/1332033271618703360 | norimaki2000 |
2020-11-24 07:50:15 | Zerologon Vulnerability: Becoming a domain admin in 10 seconds CVE-2020-1472: https://t.co/xNKCM6rvw4… https://t.co/PahgpmCw4e https://bit.ly/35KpV8c https://twitter.com/i/web/status/1331142314958483457 | secforeveryone |
2020-11-23 18:40:34 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-11-23 13:40:10 | Zero Logon - I have just completed this room! Check it out: https://t.co/aVudYLiD9F #tryhackme #CVE-2020-1472… https://t.co/1JSur3o5gh https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1330867161959706628 | AdamaSitou |
2020-11-22 23:10:05 | Windows Serverの脆弱性「Zerologon(CVE-2020-1472)」を悪用した攻撃に強い警戒感、ADサーバ利用企業は早急な対応を~2020年10月の気になるセキュリティニュース~|SecureOWL|KCCS https://t.co/BCXTlzl4RS https://www.kccs.co.jp/secureowl/column/column10041.html | nichii_a |
2020-11-21 07:50:03 | A security firm named @securabv has published a white paper of a vulnerability (CVE-2020-1472) affecting Microsoft'… https://t.co/Gx8wTDGFIW https://twitter.com/i/web/status/1330055152175353856 | secforeveryone |
2020-11-20 17:00:03 | Windows Serverの脆弱性「Zerologon(CVE-2020-1472)」を悪用した攻撃に強い警戒感、ADサーバ利用企業は早急な対応を~2020年10月の気になるセキュリティニュース~|SecureOWL|KCCS https://t.co/ZLqR8aCcvL http://dlvr.it/Rm5jSN | nichii_a |
2020-11-20 00:40:05 | Zerologon:Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/5v59HG9Xve https://twitter.com/i/web/status/1329584520593629185 | malwaresick |
2020-11-19 23:42:50 | はてなブログに投稿しました #はてなブログ 中華系ハッキンググループAPT10によるZeroLogonの脆弱性(CVE-2020-1472)を悪用した新たな攻撃の観測について - みっきー申す https://t.co/V5Q8eF83w5 https://micro-keyword.hatenablog.com/entry/2020/11/20/082956 | microkeyword |
2020-11-19 11:40:03 | 中國APT駭客組織鎖定日本組織發動攻擊,並企圖打造濫用Zerologon漏洞的工具 https://t.co/H8EXsN8lDY 能夠讓駭客取得網域控制權的Zerologon漏洞(CVE-2020-1472),在今年9月底開始被… https://t.co/WneEZ5iEC7 https://www.ithome.com.tw/news/141219 https://twitter.com/i/web/status/1329388039718617089 | M157q_News_RSS |
2020-11-19 09:10:14 | C'mon people, patch that Zerologon vuln! Massive hack hits companies around the world #CVE-2020-1472… https://t.co/2uwgbbbhIY https://twitter.com/i/web/status/1329349753944076288 | OliverRochford |
2020-11-18 23:40:47 | Active Directoryの脆弱性「Zerologon (CVE-2020-1472)」に要注意! :Netlogonに潜む特権昇格バグの脅威とその対策 https://t.co/Vy3Y8b9m3s https://blogs.manageengine.jp/domain-controller-patch-alert-vulnerability/?utm_source=nllhtml&utm_medium=zcmlr&utm_campaign=November2020 | m8oakl |
2020-11-18 23:30:06 | マイクロソフトが公開したADの重大な脆弱性(CVE-2020-1472)を悪用した攻撃「Zerologon」 | m8oakl |
2020-11-15 22:00:03 | @anthomsec @arekfurt That, and they should actually patch CVE-2020-1472 (and everything else). These speedrun ra… https://t.co/txD6E7GENy https://twitter.com/i/web/status/1328094494605000704 | JimSycurity |
2020-11-15 18:20:09 | CVE-2020-1472 putting Time To RYUK into two hours. You could go to an hour long company all hands, and then lunch,… https://t.co/PKzmIxMLrK https://twitter.com/i/web/status/1328038372418478081 | anthomsec |
2020-11-11 11:20:33 | The recent disclosure of CVE-2020-1472 vulnerability showcases the need for tools that allow defenders to quickly r… https://t.co/IE38ZiQ4xQ https://twitter.com/i/web/status/1326482708948791296 | blackcellteam |
2020-11-10 18:30:08 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-11-10 01:30:02 | YES! WinPwn now checks all domain controllers of the current domain for zerologon - CVE-2020-1472 https://t.co/z3WMs4zhcu https://twitter.com/ShitSecure/status/1325856474439028739 | jessefmoore |
2020-11-09 21:40:03 | Aporte de como funciona Zerologon (CVE-2020-1472) contra un servidor con Rol de Controlador de Dominio y crackeo de… https://t.co/3GLHAVGfMa https://twitter.com/i/web/status/1325915186344157184 | JorgeMarva |
2020-11-09 17:50:10 | WinPwn now checks all domain controllers of the current domain for zerologon - CVE-2020-1472 🥳 So easy to exploit… https://t.co/jY6QaNAKzr https://twitter.com/i/web/status/1325856474439028739 | ShitSecure |
2020-11-09 15:10:05 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/UHQaoptVuz https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | HANIALSULAMIx |
2020-11-09 13:00:05 | O meu post sobre o ZeroLogon (CVE-2020-1472) está bombando. Seria por conta do que aconteceu no STJ ?… https://t.co/VYeTFv0Xl4 https://twitter.com/i/web/status/1325783172169277442 | DanielDonda |
2020-11-09 01:20:03 | @akirakia CVE-2020-1472 の脆弱性対応でアクセスできなくなる NAS が多発してるという事例にぶち当たった今日このごろ | garathea |
2020-11-06 22:50:07 | Biden : 264 Trump : 214 MSFT: CVE-2020-1472 | helmorchadi |
2020-11-06 19:20:31 | @LoLrenzoL CVE-2020-1472 CVE-2020-3992 CVE-2019-5544 foram essas as vulnerabilidades que eles exploraram | ollemg |
2020-11-06 17:50:19 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/8ZBVloa5Ff https://twitter.com/i/web/status/1324769781694799879 | eve_rco |
2020-11-06 14:50:09 | #Microsoft issued the patch for CVE-2020-1472 (#Zerologon), a vulnerability that allows an attacker to elevate to t… https://t.co/Fbvn1WvLvO https://twitter.com/i/web/status/1324725492168220675 | KrollWire |
2020-11-06 12:10:18 | @BleepinComputer Internal sources alleged CVE-2020-1472 (Zero Logon) has been exploited as well as CVE-2019-5544 and CVE-2020-3992. | BruteBee |
2020-11-05 22:30:05 | CVE-2020-1472 (Zerologon) Exploit Detection Cheat Sheet https://t.co/8ggVz3f1Rx https://www.kroll.com/en/insights/publications/cyber/cve-2020-1472-zerologon-exploit-detection-cheat-sheet | kirtanSec |
2020-11-05 20:00:51 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/kd0mxnz2SE https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | sarmentots |
2020-11-05 19:40:14 | Worth a read: Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/L9FXoYqxuV https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | SteveSyfuhs |
2020-11-05 14:00:11 | すごい。分かった気になれたw CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/XDCRaACRzA @YouTubeより https://youtu.be/1h_wlMWwyB4 | ionis_h |
2020-11-05 08:10:21 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 Original release date: October 29, 2020 Microsoft has r… https://t.co/ywVEQi8rog https://twitter.com/i/web/status/1324261228794007557 | threatmeter |
2020-11-04 16:21:20 | You’ve probably heard about CVE-2020-1472, also known as ZeroLogon, by now. Team Ambush decided to put this exploit… https://t.co/OOOYqT7iVB https://twitter.com/i/web/status/1324021256098820097 | FRSecure |
2020-11-04 03:50:18 | CVE-2020-1472 MSの当初リスク評価低かったのに 別機関で10段階中10なのね😱 >RT | maccha1030 |
2020-11-03 18:30:05 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-11-03 17:40:14 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/xfS2psVN03 https://twitter.com/i/web/status/1323680330998517761 | ITANALYTICS_MX |
2020-11-03 12:00:20 | If you work at a company that has an unpatched domain controller for CVE-2020-1472, tell your admins about 0patch. https://t.co/yJDfMiHiy1 | 0patch |
2020-11-03 09:42:11 | Рецепты по обнаружению фактов эксплуатации уязвимости #Zerologon (CVE-2020-1472) от команды https://t.co/JKNSB9nRWm… https://t.co/FK0JhXJgkP http://BI.ZONE https://twitter.com/i/web/status/1323560979414814720 | BlackMatter23 |
2020-11-03 09:21:15 | CVE-2020-1472 a.k.a. Zerologon attacker without credentials elevate highest privileges in domain Credentials compro… https://t.co/JBpQ3nxuCh https://twitter.com/i/web/status/1323553455038963712 | GomisHenk |
2020-11-03 08:50:16 | #cybercrime, threat actors continue to exploit CVE-2020-1472 vulnerability. @Microsoft #CyberSecurity experts: It… https://t.co/aa94yCvqa2 https://twitter.com/i/web/status/1323546437033041921 | FBussoletti |
2020-11-03 06:51:27 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/p13I7ICtls https://twitter.com/i/web/status/1323516526830518272 | OberbergOnline |
2020-11-02 16:00:04 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 - https://t.co/6WFo3Fn0Mw #news https://buff.ly/3kLYyzm | RisingCyberLLC |
2020-11-02 10:50:02 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/s52sy0Nc87 https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | HenkvanRoest |
2020-11-01 23:10:02 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/1ed7alf6eA https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | Rikunchuu |
2020-11-01 18:40:15 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-31 18:40:03 | If you work at a company that has an unpatched domain controller for CVE-2020-1472... quit | Nolan_Mcfly |
2020-10-31 18:30:17 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-31 18:00:05 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 Original release date: October 29, 2020 Microsoft has re… https://t.co/QP9dhrJ9Gv https://twitter.com/i/web/status/1322598728780361729 | InfoSecHotSpot |
2020-10-31 15:10:11 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/EKnzhcVkDu #uscert #gov https://buff.ly/3myDtJh | NotTruppi |
2020-10-31 13:20:09 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 - https://t.co/857KxzDFRj #news https://buff.ly/31XHTBy | andrewsmhay |
2020-10-31 13:10:33 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/2WlCysD8tj https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | samilaiho |
2020-10-31 13:10:27 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/aVfEDnI57Q https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | Alshakarti |
2020-10-31 07:30:16 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/uFNXx72qXc https://ift.tt/3jF1f4B | bug_less |
2020-10-31 05:10:39 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/bdJWM7TAcG #MSFTAdvocate https://lnkd.in/dbmv_Cq | CriticalBoss |
2020-10-31 02:10:44 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 #ZeroLogon #CyberSecurity https://t.co/Klr3vjI5eq https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472?utm_medium=email&_hsmi=98641688&_hsenc=p2ANqtz-915sC3xBzfoaBtrRegVn8huIleMlCYCRbfu4rWedWM4B7eyIMq3wuvhJnW8f336geAaUmZQB7p4rOytw3Un_W9zWud2t8kQ3X1lXhjl-Hc01eOVjc&utm_content=98641688&utm_source=hs_email | malwaresick |
2020-10-31 00:10:04 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) – Microsoft Security Response Center https://t.co/tQGcjcQr8n https://buff.ly/34EGh1i | JasonWiele |
2020-10-30 21:21:12 | CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 https://t.co/Rn0qCsiZ3a https://support.microsoft.com/ja-jp/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | muupapa |
2020-10-30 21:00:16 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 #Anonymous https://t.co/9ZoJ2hF04G https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | AnonAnonymous |
2020-10-30 19:30:06 | Netlogon: Microsoft Warns of Continued Exploitation of CVE-2020-1472 ( https://uscert. https://t.co/P9qqA4g1h4 cve-… https://t.co/EBnixL3Qet http://cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continuedexploitation- https://twitter.com/i/web/status/1322257514352668673 | cal_csic |
2020-10-30 19:20:09 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/l32r6MltQC http://aka.ms/AAa4wr6 | bsuneja |
2020-10-30 18:31:08 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-30 18:25:07 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/WKhphMGjE3 via @USCERT_gov http://dlvr.it/Rkbz0S | AcooEdi |
2020-10-30 18:06:04 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/WKhphMGjE3 via @USCERT_gov http://dlvr.it/Rkbz0S | AcooEdi |
2020-10-30 16:40:19 | Microsoft warns that the Zerologon vulnerability (CVE-2020-1472) in Netlogon continues to be exploited in the wild https://t.co/Ftysb3LH67 https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | virusbtn |
2020-10-30 16:40:14 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 | CISA https://t.co/1PU8U3wkN1 < The patch for this was… https://t.co/8UPxfgfbDy https://buff.ly/3myDtJh https://twitter.com/i/web/status/1322216243634589697 | bschorr |
2020-10-30 16:40:08 | Attacks exploiting #Netlogon #vulnerability (CVE-2020-1472) https://t.co/hNNfjiBJoP https://www.tenforums.com/windows-10-news/167409-attacks-exploiting-netlogon-vulnerability-cve-2020-1472-a.html | Shawn_Brink_MVP |
2020-10-30 16:40:05 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 | CISA https://t.co/mdnVANKuvU https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | rodtrent |
2020-10-30 16:30:09 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 | CISA https://t.co/OJoTzHEUbG #cybersecurity… https://t.co/uBQK9fJ3KH https://buff.ly/3myDtJh https://twitter.com/i/web/status/1322213743816790016 | NcuIsao |
2020-10-30 16:30:07 | @Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/QCV49fcITB #PatchYourShit https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | geekymalcolm |
2020-10-30 16:20:06 | #Zerologon – Find out more about the CVE-2020-1472 vulnerability ➡️ https://t.co/JZjXAhl2dY #cybersecurity https://t.co/0IdLksltPb https://www.stormshield.com/news/cve-2020-1472-zerologon-targeting-corporate-networks/?utm_source=twitter&utm_medium=social&utm_campaign=organic_post | Stormshield |
2020-10-30 15:50:05 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 Microsoft has released a blog post on cyber threat acto… https://t.co/X2TXq9eDpd https://twitter.com/i/web/status/1322201166823018497 | AlirezaGhahrood |
2020-10-30 15:50:05 | Microsoft warns of ongoing exploits against Zerologon vulnerability (CVE-2020-1472) https://t.co/jW4VoujP7m… https://t.co/36YeNiESDf https://buff.ly/2JdjLnY https://twitter.com/i/web/status/1322200891680849923 | securezoo |
2020-10-30 15:30:11 | Update your servers and computers!!! Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/aDwwXq733m https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | ITMS_NV |
2020-10-30 15:20:17 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 #cybersecurity #threat https://t.co/TU7ery20J3 https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | hintz2010 |
2020-10-30 14:50:36 | #MSRC #ActiveDirectory #EOP Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/oWkHkFUmun https://bit.ly/3jIbB3x | SasStu |
2020-10-30 14:30:07 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/0lMQSF4eUb https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | SecureNetIT |
2020-10-30 14:20:11 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 Microsoft has released a blog post on cyber threat acto… https://t.co/RPDgiAFPkN https://twitter.com/i/web/status/1322181023766106113 | DoITSecurity |
2020-10-30 12:30:16 | I wonder how many people patched CVE-2020-1472 but did not do the needed aftercare to make it actually work... | n3tb4dg3r |
2020-10-30 11:10:33 | @CISAgov issued a patch validation script for #Zerologon (CVE-2020-1472) that checks if appropriate updates are ins… https://t.co/DDDIQGTNlT https://twitter.com/i/web/status/1322131970550358016 | 0patch |
2020-10-30 11:10:12 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/ngh8YqyOob https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | ralucasaceanu |
2020-10-30 11:00:08 | #HotTopic CVE-2020-1472 #patching reminder >> 4 steps UPDATE/FIND/ADDRESS/ENABLE https://t.co/wDK5rGNMqE https://t.co/GlujIp073E https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | pdominjon |
2020-10-30 10:10:54 | SonicWall: protezione attiva per CVE-2020-1472 (Microsoft NetLogon) https://t.co/tztrCSBi3T https://www.alias.it/news/2020/sonicwall-protezione-attiva-per-cve-2020-1472-microsoft-netlogon-/#.X5vlsm1VXZw.twitter | Alias_Srl |
2020-10-30 09:30:39 | #Zerologon - Détails sur la vulnérabilité CVE-2020-1472 ➡️ https://t.co/OQNsZHjFDs #cybersécurité https://t.co/tHGxFCt3lr https://www.stormshield.com/fr/actus/cve-2020-1472-zerologon-les-reseaux-entreprise-dans-le-viseur/?utm_source=twitter&utm_medium=social&utm_campaign=organic_post | Stormshield |
2020-10-30 08:40:06 | Microsoft Warns of Continued Exploitation of CVE-2020-1472: https://t.co/oDy59Slnu2 #follow & #RT #cybersecurity #infosec https://ift.tt/3jF1f4B | KeoXes |
2020-10-30 08:20:04 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) – Microsoft Security Response Center https://t.co/A5TRL8ZQWb https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | Secnewsbytes |
2020-10-30 07:40:06 | セキュリティ関連のニュース記事などで取り上げられることが多い Zerologon ですが、これは Netlogon の脆弱性で、マイクロソフトからは 2020 年 8 月に脆弱性情報 CVE-2020-1472 を公開しています。 https://t.co/jz2LIinspU https://support.microsoft.com/ja-jp/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | kristinayasuda |
2020-10-30 07:30:48 | แจ้งเตือน พบการโจมตีช่องโหว่ Zerologon (CVE-2020-1472) ควรรีบแพตช์และตรวจสอบการตั้งค่าเซิร์ฟเวอร์เพื่อลดความเสี่ยง https://t.co/yXY4r9Up2Q https://www.thaicert.or.th/newsbite/2020-10-30-01.html | ThaiCERT |
2020-10-30 07:11:15 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/FiY78xfjnF #CERT #CyberSecurity #InfoSec #SOC #TousSecNum https://bit.ly/34FKK41 | cyberdian_cert |
2020-10-30 07:10:46 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/eiguReuPkx https://ift.tt/3jF1f4B | cyberbuzznews |
2020-10-30 07:10:23 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/OTwnNds6xY https://t.co/JC0KYlMCSu https://ift.tt/3jF1f4B | geektech713 |
2020-10-30 07:00:18 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) - Deploying the August 11, 2020 security update or later… https://t.co/Tfpf1nojma https://twitter.com/i/web/status/1322069680635453440 | Ourghanlian |
2020-10-30 07:00:09 | Microsoft warning on Windows ZeroLogon vulnerability, CVE-2020-1472. #CVE-2020-1472 #NetLogon #ZeroLogon https://t.co/WpAhiYRZOS https://thelateralsecurity.com/2020/10/30/microsoft-warns-against-an-attacks-exploiting-netlogon-vulnerability/ | AndSiem |
2020-10-30 06:20:07 | NetLogon privilege escalation vulnerability, CVE-2020-1472 #CVE-2020-1472 #NetLogon #PrivilegeEscalation #ZeroLogon https://t.co/FxbuI8USEZ https://thelateralsecurity.com/2020/10/30/cve-2020-1472-netlogon-elevation-of-privilege-vulnerability/ | AndSiem |
2020-10-30 04:10:09 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/mMHisew8B7 https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | microkeyword |
2020-10-30 03:10:06 | Microsoft Warns of Continued Exploitation of CVE-2020-1472, an elevation of privilege vulnerability in Microsoft’s… https://t.co/pH9qjDGZfj https://twitter.com/i/web/status/1322012850433396736 | privsecguy |
2020-10-30 02:50:12 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/NFCJiabzle https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | RyushiAhnam |
2020-10-30 02:10:04 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/iXrBq7kzKw https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | aesj8 |
2020-10-30 02:00:04 | #cybersecurity - Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/pKLnXW9WYe https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | empressbat |
2020-10-30 01:20:44 | CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 - マイクロソフト(2020/10/30) https://t.co/KfbWJVVghR https://support.microsoft.com/ja-jp/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | spread_jp |
2020-10-30 01:20:37 | Patch! And follow guidance please. Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/NX8rnRdqKj https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | ajohnsocyber |
2020-10-30 01:20:22 | 詳細手順出ていたのですな。全てのAD管理者はチェックすべし:CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 https://t.co/m1iHi1bxZT https://itnews.org/news_resources/235250 | tamosan |
2020-10-30 01:00:19 | #Attacks #exploiting #Netlogon #vulnerability (CVE-2020-1472) https://t.co/hOg9FSQq0t https://bit.ly/2TCR3yY | omvapt |
2020-10-30 00:50:20 | Zerologon(CVE-2020-1472)への注意喚起が再度なされていますね。8月にアップデートが公開されているものの、未だ攻撃が継続されているとのこと。 アップデートは必須の対策として、万一のときのためにAD操作ログの監視… https://t.co/1A4y6Lu7pT https://twitter.com/i/web/status/1321975662815576064 | ns_lsc |
2020-10-30 00:30:21 | 【日本のセキュリティチームのブログ】 Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/5MF0SIs2RJ http://dlvr.it/RkcX45 | azuminoICT |
2020-10-30 00:10:05 | Make sure you #patch #netlogon vulnerability CVE-2020-1472! https://t.co/tTwsnIXX7D https://twitter.com/msftsecresponse/status/1321905885782941696 | CurtisHoughton4 |
2020-10-29 23:40:04 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 - https://t.co/na7mvOaPYJ https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | moton |
2020-10-29 23:30:12 | Zelologonとも呼ばれているNetlogonの脆弱性 (CVE-2020-1472)について今一度注意喚起しました(英語)ガイダンス内容は変わっていません。未対応の方はDCに8月以降のパッチの適用をお願いします https://t.co/EhCX44nNDh https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | EurekaBerry |
2020-10-29 23:00:06 | Attackers are still exploiting the #Zerologon vulnerability (CVE-2020-1472). So please patch NOW! #netlogon… https://t.co/lFX47JmWM9 https://twitter.com/i/web/status/1321946167761162240 | RiskSense |
2020-10-29 22:30:09 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/daIthtyGhH https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | valdet_b |
2020-10-29 22:20:14 | CVE-2020-1472 can be validated without privs (it's unauthenticated) RCE which gets you to SYSTEM on vulnerable doma… https://t.co/381JmbqJep https://twitter.com/i/web/status/1321939389866528770 | UK_Daniel_Card |
2020-10-29 22:00:08 | Criminals are leveraging CVE-2020-1472 (ZeroLogon) to exploit domain controllers as part of ransomware campaigns! w… https://t.co/yGxAkrreT6 https://twitter.com/i/web/status/1321934819069173760 | Cv19Cyber |
2020-10-29 21:50:28 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/GSUjZRS9PV https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | ebellis |
2020-10-29 21:40:21 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) - https://t.co/qvcSM9XaIz https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | ka0com |
2020-10-29 21:40:16 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 - https://t.co/eigntZH48B https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472 | ka0com |
2020-10-29 21:40:11 | New forum topic: Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/xnjojxPSWT http://feedproxy.google.com/~r/GeekzoneForumsLatestPosts/~3/CK-mhLvmqzk/forums.asp | geekzonenzforum |
2020-10-29 21:40:07 | Attackers are continuing to target the #Zerologon CVE-2020-1472 bug, so if your organization hasn't applied the pat… https://t.co/9JdlIzXkU5 https://twitter.com/i/web/status/1321929782783807491 | DecipherSec |
2020-10-29 21:20:06 | @BiteFre4k gonna show how to check for CVE-2020-1472 using pingcastle! | UK_Daniel_Card |
2020-10-29 21:10:31 | ...and if you think you’ve already patched every DCs for CVE-2020-1472, check again. Seeing customers where just on… https://t.co/JG5ItqsaJR https://twitter.com/i/web/status/1321920222220177412 | PetitoHead |
2020-10-29 21:10:22 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/vTuWcsYff7 https://www.itsecuritynews.info/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ | IT_securitynews |
2020-10-29 20:50:07 | CERT Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/xnz22juO6T https://bit.ly/3mCDwUi | PAUL_CSFI |
2020-10-29 20:40:18 | Microsoft SRC | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/oS4kYLdw9V https://bit.ly/3kJflmE | StopMalvertisin |
2020-10-29 20:40:16 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) Microsoft has received a small number of reports from cu… https://t.co/fYQfAmQoWm https://twitter.com/i/web/status/1321913232680955905 | Ben_P9T |
2020-10-29 20:40:14 | > Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/NAHSVd2YY9 http://dlvr.it/Rkc2jb | PaulomorgadoN |
2020-10-29 20:40:12 | If you haven't applied security updates from Aug 2020 for CVE-2020-1472, please do. https://t.co/qhckHmwhMm Guidanc… https://t.co/NSoodvR5Nd http://aka.ms/CVE-2020-1472 https://twitter.com/i/web/status/1321913312112726016 | bsuneja |
2020-10-29 20:30:20 | New post from https://t.co/9KYxtdZjkl (Attacks exploiting Netlogon vulnerability (CVE-2020-1472)) has been publishe… https://t.co/s52s80JIF8 http://www.sesin.at https://twitter.com/i/web/status/1321909684337561601 | www_sesin_at |
2020-10-29 20:30:19 | New post from https://t.co/uXvPWJy6tj (Attacks exploiting Netlogon vulnerability (CVE-2020-1472)) has been publishe… https://t.co/aVG5tzKIYs http://www.sesin.at https://twitter.com/i/web/status/1321909685675565056 | WolfgangSesin |
2020-10-29 20:30:10 | Microsoft Warns of Continued Exploitation of CVE-2020-1472https://us-cert.cisa.gov/ncas/current-activity/2020/10/29… https://t.co/rSB4Uj7RMv https://twitter.com/i/web/status/1321910634565554183 | gregoryfarley |
2020-10-29 20:30:05 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/D4UwGMFuYy https://sl.advdat.com/3eaqz1m | ADVDAT_OH |
2020-10-29 20:11:02 | Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/F3ZGa1uUok https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472?utm_source=dlvr.it&utm_medium=twitter | RigneySec |
2020-10-29 20:11:01 | ok gang! i know @ZephrFish has made some awesome content on CVE-2020-1472 but i think its time to get some more foc… https://t.co/WlfcaiL9wK https://twitter.com/i/web/status/1321905774214418433 | UK_Daniel_Card |
2020-10-29 20:11:00 | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/kry6ZWicm4 https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/?utm_source=dlvr.it&utm_medium=twitter | RigneySec |
2020-10-29 20:10:58 | #infosec Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/Ctm9QWNno7 https://ift.tt/3jF1f4B | jeffreydbrown |
2020-10-29 20:10:57 | [Recomendado]Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/95G7PwBfr1 #seguridadsi #ciberseguridad http://zpr.io/HFuhM | seguridad_si |
2020-10-29 16:30:20 | CVE-2020-1472 への対応は重要 #WindowsServerSummit Domain Controller | zhuky7 |
2020-10-29 13:43:33 | Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range #Splunk #Monitoring #DevOps #CloudAffaire https://t.co/FFznDZqPCI https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html | CloudAffaire |
2020-10-28 08:21:22 | Zerologon CVE identifier: CVE-2020-1472 Affected products: Certain QNAP NAS https://t.co/wjrccHccXZ ------------ 【… https://t.co/yJ2WTSofCl https://www.qnap.com/zh-tw/security-advisory/qsa-20-07 https://twitter.com/i/web/status/1321363765053378560 | TWCERTCC |
2020-10-28 06:40:05 | CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/mByYxf3uVq @YouTubeより https://youtu.be/1h_wlMWwyB4 | hydra_frag |
2020-10-27 15:00:02 | Découvrez notre dernier article : La vulnérabilité Zerologon CVE-2020-1472 menace les contrôleurs de domaine… https://t.co/4SSSnywgCZ https://twitter.com/i/web/status/1321103908891222016 | ATuncert |
2020-10-27 13:50:05 | Sentinelone warnt vor kritischer Schwachstelle Zerologon CVE-2020-1472, besser bekannt als #Zerologon, ist eine kr… https://t.co/XR9i6nKiCr https://twitter.com/i/web/status/1321084382376087562 | netzpalaver |
2020-10-27 11:10:03 | If you need another reason to make sure your domain controllers are patched for the Zerologon (CVE-2020-1472) vulne… https://t.co/lsH1o7St22 https://twitter.com/i/web/status/1321044313615335425 | breachbits |
2020-10-27 05:50:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/D7Vp1GWW3G https://twitter.com/i/web/status/1320963983579512832 | 916MARINE |
2020-10-27 00:50:02 | CVE-2020-1472 - Vulnerabilidad de elevación de privilegios de Netlogon en Windows Server 2019/2016 https://t.co/IZTL6BjGuw https://youtu.be/WMWo_yNsS1A | JGAITPro |
2020-10-26 18:30:06 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-26 18:20:02 | Zerologonの脆弱性は、WindowsでActive Directoryのユーザー認証に使われる「Netlogonリモートプロトコル」に存在する(CVE-2020-1472)。悪用された場合、認証を受けていない攻撃者がドメイ… https://t.co/jVDVTMru8C https://twitter.com/i/web/status/1320790144647979008 | KazekitaruT |
2020-10-26 13:00:03 | Zerologon (CVE-2020-1472) 「ドメインコントローラーにパッチ適用を」 https://t.co/QpA8XBnMOt #Qiita https://qiita.com/kodamap/items/436f7bc84a66b6267fee | k_oi |
2020-10-26 11:00:02 | Zerologonについては米国土安全保障省のセキュリティ機関CISAも9月の時点で全連邦省庁に対して異例の緊急指令を出し、CVE-2020-1472の更新プログラムを直ちに適用するよう指示していた。 ランサムウェアが見せつけた… https://t.co/hzEec1oKaG https://twitter.com/i/web/status/1320680437954478081 | kai_ri_0001 |
2020-10-26 06:10:03 | New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/Auvs4tNACh https://lnkd.in/ecxvfgf | Jemandi |
2020-10-26 05:10:04 | Zerologon vulnerability [CVE-2020-1472] allows attackers to take over domain controllers without triggering any ala… https://t.co/TxTWsb9BL7 https://twitter.com/i/web/status/1320591243722825729 | AkremBasha |
2020-10-26 05:00:02 | Zerologon vulnerability [CVE-2020-1472] allows attackers to take over Domain Controller without triggering any alar… https://t.co/eNThGpvuUv https://twitter.com/i/web/status/1320590978491781120 | AkremBasha |
2020-10-25 18:30:05 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-25 13:30:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/C3o1yjzsFZ https://twitter.com/i/web/status/1320354964368130048 | riddell_lindsay |
2020-10-24 17:50:03 | Zerologon (CVE-2020-1472)、結局のところ1/256でChallenge–response authのvalueが0で埋まっていたということと理解したが、それに何年もの間だれも気づかなかったのか、という疑問が残った。 | juntani |
2020-10-24 16:20:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/rUa96QL6wu https://twitter.com/i/web/status/1320035785748467714 | ITNEXT_USA |
2020-10-24 13:40:04 | hala yamamadık mı ? #CVE-2020-1472 https://t.co/pkSg7wsqep https://lnkd.in/dUNBAzW | melihozhan |
2020-10-24 10:20:03 | CVE-2020-1472 угрожает контроллеру домена https://t.co/iKSz10ojXQ https://t.co/2WUtxolI0C https://bit.ly/3m4wcka | free_safety_ru |
2020-10-23 18:50:05 | Terse note by French IT outsource firm isn't helpful. If #zerologon (CVE-2020-1472) was involved, the patch was rel… https://t.co/GGIzc1EKJN https://twitter.com/i/web/status/1319711459064958978 | kurmac |
2020-10-23 18:30:07 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-23 17:10:07 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/dyhEqp0C6Q https://twitter.com/i/web/status/1319685061936091136 | arielMIS |
2020-10-23 15:20:02 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/uzEPMXDVqe https://twitter.com/i/web/status/1319659246225641475 | CharlesJBooth |
2020-10-23 14:10:11 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/gIB5wTIiG1 https://twitter.com/i/web/status/1319639938393165826 | Fortinet26 |
2020-10-23 12:50:03 | QNAP warns of Windows Zerologon flaw affecting some NAS devices CVE-2020-1472 #Security https://t.co/qOi87CUclf https://t.co/fD6SvrZHYz https://www.qnap.com/en-us/security-advisory/QSA-20-07 https://www.bleepingcomputer.com/news/security/qnap-warns-of-windows-zerologon-flaw-affecting-some-nas-devices/ | yipcw |
2020-10-23 06:40:02 | CVE-2020-1472 - Vulnerabilidad de elevación de privilegios de Netlogon e... https://t.co/KfwavMT162 a través de @JGAITPro https://youtu.be/WMWo_yNsS1A | apuntesjulio |
2020-10-23 01:50:03 | CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability https://t.co/ZlRUmMvRc6 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472 | kosik2061 |
2020-10-23 01:40:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/T3BeA7NSVQ https://twitter.com/i/web/status/1319451546854240258 | hutton647 |
2020-10-23 01:30:02 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/aJXoWdnDTM https://twitter.com/i/web/status/1319450586367037440 | EBSolutionCA |
2020-10-23 01:00:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/IIWiuxPSDm https://twitter.com/i/web/status/1319441691510755328 | khronostelecom |
2020-10-23 01:00:02 | QNAP advierte de que la #vulnerabilidad crítica Zerologon (CVE-2020-1472) de Windows afecta a algunos de sus dispos… https://t.co/lojEWiDTC2 https://twitter.com/i/web/status/1319442535882870790 | NormanOre |
2020-10-23 00:40:14 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/dH3AVgTFJS https://twitter.com/i/web/status/1319435936644714497 | hytekcomputers |
2020-10-23 00:40:11 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/kCP5s0DW56 https://twitter.com/i/web/status/1319436770736570368 | star_privacy |
2020-10-23 00:40:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/yy4bBOO1JU https://twitter.com/i/web/status/1319437716631789571 | jesuscajero |
2020-10-23 00:30:06 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/KEgm8t90H4 https://twitter.com/i/web/status/1319433746370658304 | Edge_worx |
2020-10-23 00:30:05 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/LWQHqsuNyg https://twitter.com/i/web/status/1319434878371434497 | CanteraIT |
2020-10-23 00:20:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/RrrNyaYZHj https://twitter.com/i/web/status/1319431851774267397 | squaremoat |
2020-10-23 00:10:08 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/CHVP4QHNld https://twitter.com/i/web/status/1319428866394521600 | SydowIS |
2020-10-23 00:00:09 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/z2vmFKIlKe https://twitter.com/i/web/status/1319427121626992640 | NorcomSolutions |
2020-10-22 23:40:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/1BJ7DTQ3Pm https://twitter.com/i/web/status/1319423048731197441 | 1Opsec2 |
2020-10-22 23:30:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/1Rb55DVIGz https://twitter.com/i/web/status/1319420122830950403 | repdym |
2020-10-22 23:30:02 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/L98pnfSfee https://twitter.com/i/web/status/1319420542873706496 | stigroup |
2020-10-22 23:20:05 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/OjPrGRHTuG https://twitter.com/i/web/status/1319416002992455681 | smbgurus |
2020-10-22 23:20:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/TqgBESKEz4 https://twitter.com/i/web/status/1319417515634790400 | em2it |
2020-10-22 23:10:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/wqmUNZhhZF https://twitter.com/i/web/status/1319415246063341568 | amsinetworks |
2020-10-22 23:10:02 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/a1MsJ1f6WJ https://twitter.com/i/web/status/1319415582069051398 | DoOver2019 |
2020-10-22 23:00:11 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/VnuO8zWIJc https://twitter.com/i/web/status/1319411795317108736 | CyberSecManaged |
2020-10-22 22:50:10 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/eFzJqgtdzC https://twitter.com/i/web/status/1319408578546065409 | barryfein |
2020-10-22 22:50:09 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/14kIYTtKSz https://twitter.com/i/web/status/1319408956608028673 | SecureERP |
2020-10-22 22:50:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/ERAzo3iBdU https://twitter.com/i/web/status/1319410472811200512 | smbgurus |
2020-10-22 22:40:16 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/sB8VLzHDrT https://twitter.com/i/web/status/1319406691524530177 | carloyolax |
2020-10-22 22:30:07 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/BaW5ChueLX https://twitter.com/i/web/status/1319403281492357122 | SecurityVal |
2020-10-22 22:30:06 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/oOC4zNw6Ew https://twitter.com/i/web/status/1319403472836583429 | WilskeRobert |
2020-10-22 22:30:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/QkFKfXZYQF https://twitter.com/i/web/status/1319404458464378881 | o_integradas |
2020-10-22 22:10:13 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/V15OnlmTnf https://twitter.com/i/web/status/1319398228689813505 | amsinetworks |
2020-10-22 22:10:05 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/2q63SAOshL https://twitter.com/i/web/status/1319399653713022982 | ThePlugGroupInc |
2020-10-22 22:10:05 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/MqANlTLbnm https://twitter.com/i/web/status/1319399650227605505 | trinitynetworx |
2020-10-22 22:10:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/snD5ZoMy1n https://twitter.com/i/web/status/1319399657311784961 | fuselogix |
2020-10-22 22:00:06 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/XuflMKPq92 https://twitter.com/i/web/status/1319395900351868928 | gatanasio_71 |
2020-10-22 21:40:09 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/wq1Ca7w4vC https://twitter.com/i/web/status/1319390923671916544 | richdonegan |
2020-10-22 21:20:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/xD5yp0evWi https://twitter.com/i/web/status/1319385633018826752 | MarcioLoboM1 |
2020-10-22 21:20:02 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/NaMBLBXCLh https://twitter.com/i/web/status/1319387499316248580 | integotec |
2020-10-22 19:30:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/hlgPFSZjEA https://twitter.com/i/web/status/1319358622896431105 | JodyPopplewell |
2020-10-22 19:11:19 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/fzvXW1I1rv https://twitter.com/i/web/status/1319352888100007936 | TechproGlobalGH |
2020-10-22 18:40:03 | CVE-2020-1472,a.k.a.Zerologon exploitation.This tool exploits a cryptographic vulnerability in Netlogon to achieve… https://t.co/z0LvGEZL4m https://twitter.com/i/web/status/1319346948206399488 | HANIALSULAMIx |
2020-10-22 18:30:05 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/y5EdiDbDbV https://twitter.com/i/web/status/1319344035874721792 | LtdNamaste |
2020-10-22 18:30:05 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-22 18:20:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/4i2LNew3qo https://twitter.com/i/web/status/1319340255888216066 | Edp4u |
2020-10-22 18:20:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/vTkrtiF575 https://twitter.com/i/web/status/1319341008811937795 | fintech_group |
2020-10-22 18:20:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/W6nn8DKMvX https://twitter.com/i/web/status/1319340588274229248 | MBITJapan |
2020-10-22 18:10:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/9dVaLQqGtw https://twitter.com/i/web/status/1319339076328300545 | CarerraHoldings |
2020-10-22 18:10:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/MlPkAfNxqt https://twitter.com/i/web/status/1319338739911561221 | INStream10 |
2020-10-22 18:00:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/6FANHUuJzu https://twitter.com/i/web/status/1319337225075777537 | FrikEnTwit |
2020-10-22 17:40:09 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/mSduJjY2GB https://twitter.com/i/web/status/1319330201592078340 | thiennh7 |
2020-10-22 17:40:08 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/81ZTeudrHb https://twitter.com/i/web/status/1319331299417620481 | flow_networks |
2020-10-22 17:40:02 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/DQ04LL6s2k https://twitter.com/i/web/status/1319332249578373122 | dr_know_yordi |
2020-10-22 17:30:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/GVWTejiI0E https://twitter.com/i/web/status/1319329210142543873 | Trust3Security |
2020-10-22 17:30:02 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/KHhHSrgy9P https://twitter.com/i/web/status/1319329441840091137 | techsenses_ |
2020-10-22 17:10:12 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/ZjiaIRDQNG https://twitter.com/i/web/status/1319323156054683648 | DanWalk39801347 |
2020-10-22 16:10:06 | CVE-2020-1472 (Zerologon) Exploit Detection Cheat Sheet https://t.co/O5F5bXaFL1 https://www.kroll.com/en/insights/publications/cyber/cve-2020-1472-zerologon-exploit-detection-cheat-sheet | n0ipr0cs |
2020-10-22 16:10:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/lMViqNn5xh https://twitter.com/i/web/status/1319309550550470658 | agrisols |
2020-10-22 16:00:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/SMbcHe9n93 https://twitter.com/i/web/status/1319306522237743105 | shanil_daya |
2020-10-22 16:00:02 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/P132eE7Vqj https://twitter.com/i/web/status/1319307278852493313 | veracompsofia |
2020-10-22 15:50:07 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/JTVgUYvh7R https://twitter.com/i/web/status/1319302508335013889 | AVFZC |
2020-10-22 15:40:05 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/zbZ3ET7JYw https://twitter.com/i/web/status/1319301377659645954 | IRIS_Technology |
2020-10-22 15:40:04 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/IoCzQNnRJh https://twitter.com/i/web/status/1319302128838594562 | info_vibes |
2020-10-22 15:40:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/j2I3fPd2gd https://twitter.com/i/web/status/1319302132483358720 | TechnologiesZm |
2020-10-22 15:40:02 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/DsdHRgMWoX https://twitter.com/i/web/status/1319302495483691010 | ShahsiRathnayak |
2020-10-22 15:30:03 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/NcrMGmoif5 https://twitter.com/i/web/status/1319299577107927046 | MicheleCiacci |
2020-10-22 14:20:02 | Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472) https://t.co/cNxpv51tkD https://fortiguard.com/threat-signal-report/3711/ryuk-threat-actors-incorporating-windows-zerologon-vulnerability-cve-2020-1472 | RMJConsulting |
2020-10-22 09:50:03 | ❗️QNAP advierte de que la #vulnerabilidad crítica Zerologon (CVE-2020-1472) de Windows afecta a algunos de sus disp… https://t.co/1PioTr5OfZ https://twitter.com/i/web/status/1319213109354110976 | matarturo |
2020-10-22 06:10:27 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/US8Bvpbchr https://twitter.com/i/web/status/1319158467744223234 | security_hunter |
2020-10-21 23:40:15 | #FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/ujti55YAzg https://twitter.com/i/web/status/1319060150066532352 | FortiGuardLabs |
2020-10-21 18:30:40 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-21 12:10:04 | Zerologon (CVE-2020-1472): Find and Remediate in Real Time with Tanium Learn more about this vulnerability, the ris… https://t.co/MY7xycdp96 https://twitter.com/i/web/status/1318885462895939584 | MLubbat |
2020-10-21 10:10:26 | New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/zRQ4QOREsl https://lnkd.in/dqqkXV7 | monaarishi |
2020-10-21 10:10:16 | AD: ---- CVE-2020-1472: #ZeroLogon by @SecuraBV CVE-2019-1040: NTLM relay bypass (@simakov_marina & @YaronZi) MDM… https://t.co/ygWjHE3V4c https://twitter.com/i/web/status/1318854954262683649 | SagieSec |
2020-10-21 08:00:31 | 緊急です!みたいなノリで、CVE-2020-1472の注意喚起メールが流れてきた。。。いやあれ一ヶ月前にニュースになってたやつですよね・・・ | iqm |
2020-10-21 07:40:20 | Security Advisory: Critical Zerologon Vulnerability (CVE-2020-1472) Redscan https://t.co/l7T3lePUv6 https://t.co/julpOqY8JN http://upflow.co/l/N7Oa | Mokoti_Inc |
2020-10-21 06:10:04 | Network Detection for ZeroLogon (CVE-2020-1472) https://t.co/p79gWa1Wli https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/network-detection-for-zerologon-cve-2020-1472/ | reverseame |
2020-10-20 18:30:23 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-20 18:10:38 | A new #attackerkb assesment on 'CVE-2020-1472 aka Zerologon' has been created by gwillcox-r7. Attacker Value: 0 | E… https://t.co/1Bi6dHK0JO https://twitter.com/i/web/status/1318613169229697026 | Attackerkb_Bot |
2020-10-20 13:50:03 | Windows Server 2008 R2以降に適用すべきパッチへのリンク先は、このページにまとまっています。 https://t.co/JEGpE3vBgF CVE-2020-1472 | Netlogon の特権の昇格の脆… https://t.co/qsiQHldqpD https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2020-1472 https://twitter.com/i/web/status/1318548525660180480 | norimaki2000 |
2020-10-20 11:40:12 | Great news. Microsoft Defender for Identity can now detect #zerologon (CVE-2020-1472). #m365 #microsoft365… https://t.co/Q0U74VGINm https://twitter.com/i/web/status/1318515315148509184 | zimmergren |
2020-10-20 11:00:12 | Ryuk in 5 h @TheDFIRReport @SwitHak ➡️Zerologon (CVE-2020-1472) exploited 2 hours after initial execution of Bazar… https://t.co/AhqgwcXlkv https://twitter.com/i/web/status/1318505657067315200 | argevise |
2020-10-19 20:30:37 | Researcher @GossiTheDog reports more attackers exploiting his Zerologon (CVE-2020-1472) honeypot… https://t.co/CWBcHx2mZ1 https://twitter.com/i/web/status/1318285800627384321 | virusbtn |
2020-10-19 18:30:30 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-19 13:10:12 | 2020/10/09 Alert (AA20-283A) 公開 https://t.co/iMjtgfpBQG 「CVE-2020-1472 に加えて ... APT攻撃者を観察しました。」 https://us-cert.cisa.gov/ncas/alerts/aa20-283a | kikou_mewan |
2020-10-19 13:00:05 | 2020/08/17 CVE-2020-1472 公開 https://t.co/DUiwdXl5et https://nvd.nist.gov/vuln/detail/CVE-2020-1472 | kikou_mewan |
2020-10-19 13:00:04 | 2020/09/23 PSA公示 https://t.co/9o7kt5XVHu 「FBIとCISAは、これまでのところ、米国人の投票を妨げたり、2020年の選挙の投票数を変更したりするような脅威は確認していません。」 (※すでにCVE-2020-1472は既知) https://www.cisa.gov/sites/default/files/publications/PSA_CyberThreats_Final-508.pdf | kikou_mewan |
2020-10-19 12:00:05 | New post: | CVE-2020-1472:NetLogon特权提升漏洞分析 https://t.co/U4KrIHH3UQ:netlogon特权提升漏洞分析/ https://reportcybercrime.com/cve-2020-1472 | digitpol_cyber |
2020-10-19 11:20:03 | Ryuk #Ransomware in 5 Hours(!) Zerologon (CVE-2020-1472) #PatchNow https://t.co/I5q6Hdf9v6 https://twitter.com/TheDFIRReport/status/1317976355271856133 | HonkHase |
2020-10-19 10:30:03 | QNAP ha lanzado una nueva actualización de seguridad (CVE-2020-1472) para prevenir que los NAS configurados como co… https://t.co/XVGW52DN23 https://twitter.com/i/web/status/1318136648631226368 | cyberseguridad |
2020-10-19 10:10:10 | #RYUK in five hours. CVE-2020-1472. Just keeping the internet safe. https://t.co/VKuwWPakgN https://twitter.com/thedfirreport/status/1317976355271856133 | anthomsec |
2020-10-19 09:50:02 | Au menu : 👉 Phishing email 👉 Contrôle du DC en moins de 2 heures via zerologon (CVE-2020-1472) 👉 Cobalt Strike, AdF… https://t.co/5m5vGR94XE https://twitter.com/i/web/status/1318126774098808832 | AElmehdi |
2020-10-19 07:30:04 | From phishing email to domain wide Ryuk ransomware in 5 hours. Privilege escalation using Zerologon (CVE-2020-1472)… https://t.co/kA3XtkgifI https://twitter.com/i/web/status/1318091284981178368 | stefant |
2020-10-19 01:40:04 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/y5Q2XFJWkp https://t.co/h6pvOlPrc2 https://www.reddit.com/r/netsec/comments/iz6vvd/a_different_way_of_abusing_zerologon_cve20201472/?utm_source=dlvr.it&utm_medium=twitter | techadversary |
2020-10-19 00:00:05 | Ryuk in 5 Hours ➡️Zerologon (CVE-2020-1472) exploited 2 hours after initial execution of Bazar ➡️Cobalt Strike & B… https://t.co/OlrFpnZW2b https://twitter.com/i/web/status/1317976355271856133 | TheDFIRReport |
2020-10-17 06:50:30 | So if you haven't patched, bad actors can SERIOUSLY mess with your domain controllers. Patch CVE-2020-1472. All t… https://t.co/4QZyC3VDn5 https://twitter.com/i/web/status/1317354969868115968 | aprilmardock |
2020-10-17 02:28:04 | Zero Logon - I have just completed this room! Check it out: https://t.co/k3M2y7eI7b #tryhackme #CVE-2020-1472… https://t.co/ckEnPledXT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316900622642388995 | isaacmichaan1 |
2020-10-17 01:48:19 | Zero Logon - I have just completed this room! Check it out: https://t.co/k3M2y7eI7b #tryhackme #CVE-2020-1472… https://t.co/ckEnPledXT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316900622642388995 | isaacmichaan1 |
2020-10-17 01:18:58 | Zero Logon - I have just completed this room! Check it out: https://t.co/k3M2y7eI7b #tryhackme #CVE-2020-1472… https://t.co/ckEnPledXT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316900622642388995 | isaacmichaan1 |
2020-10-16 18:30:26 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-16 12:31:26 | Zero Logon - Naughty little exploit!! Check it out: https://t.co/nmNrXji9Xs #tryhackme #CVE-2020-1472 #Active Dire… https://t.co/MXQNd7eDPF https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1317077855336075265 | DonnieMarcoFoto |
2020-10-16 08:40:09 | در رابطه با CVE-2020-1472 شاید به درد شما بخورد. https://t.co/6iyYkKWs21 https://twitter.com/ArashNaderpour/status/1317005622387240966 | Sadegh65 |
2020-10-15 18:30:21 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-15 16:25:15 | Zero Logon - I have just completed this room! Check it out: https://t.co/N11FuVIqip #tryhackme #CVE-2020-1472… https://t.co/edt30hHkty https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316481404767789061 | MikeHanchos |
2020-10-15 16:06:09 | Zero Logon - I have just completed this room! Check it out: https://t.co/N11FuVIqip #tryhackme #CVE-2020-1472… https://t.co/edt30hHkty https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316481404767789061 | MikeHanchos |
2020-10-15 15:45:41 | Zero Logon - I have just completed this room! Check it out: https://t.co/N11FuVIqip #tryhackme #CVE-2020-1472… https://t.co/edt30hHkty https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316481404767789061 | MikeHanchos |
2020-10-15 11:30:21 | برای شناسایی آسیبپذیری #Zerologon یا CVE-2020-1472 در سرورهای ویندوزی، این Event-ID ها رو مانیتور کنید: ٍEvent-I… https://t.co/P8YnDCjweI https://twitter.com/i/web/status/1316702600692150273 | M_Shahpasandi |
2020-10-15 09:50:34 | Exploiting #ZeroLogont CVE-2020-1472 (Part I - Reset) DC Domain Admin Password Reset!!! https://t.co/bpeyEpvIbb https://www.youtube.com/watch?v=3xEk6ZaBMJ8&feature=youtu.be | Anastasis_King |
2020-10-15 09:20:12 | اگر کسی اینجا بتونه برای zerologon که متعلق به CVE-2020-1472 یه رول ست Snort بنویسه، کمک بزرگی به بیمارستانهای کشو… https://t.co/DPGGIEVsIh https://twitter.com/i/web/status/1316669425748246530 | aliereza |
2020-10-15 08:40:32 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/flOXDXWIza https://twitter.com/i/web/status/1316658874582065152 | AlicePintori |
2020-10-15 03:40:15 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/aT9LXzqK5y https://twitter.com/i/web/status/1316583386610163712 | Patent_4405829 |
2020-10-14 20:17:08 | Zero Logon - I have just completed this room! Check it out: https://t.co/HiFHxiKqg4 #tryhackme #CVE-2020-1472… https://t.co/k6AFNX84F5 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316465886228811776 | wearyandroid |
2020-10-14 18:30:37 | CVE-2020-1472 https://t.co/BmC2HtUEmi #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-14 17:20:26 | New post: Zerologon: Windows Netlogon Vulnerability CVE-2020-1472 https://t.co/LrGkgiVcdL https://reportcybercrime.com/zerologon-windows-netlogon-vulnerability-cve-2020-1472/ | digitpol_cyber |
2020-10-14 16:20:40 | Zerologon: Windows Netlogon Vulnerability CVE-2020-1472 https://t.co/hAXaXwqOUJ https://www.itsecuritynews.info/zerologon-windows-netlogon-vulnerability-cve-2020-1472/ | IT_securitynews |
2020-10-14 14:40:32 | تو این #وبینار، «مهدی حاتمی» دربارهی آسیبپذیری CVE-2020-1472 موسوم به #Zerologon و روشهای کاربردی رو برای شناسا… https://t.co/9XmIFTY5Oo https://twitter.com/i/web/status/1316386248643272708 | RavinAcademy |
2020-10-14 13:00:42 | اطلاعیههای مذکور مربوط به ارتقای مجوز دسترسی (elevation of privilege) با شناسه CVE-2020-1472 در Netlogon مایکروساف… https://t.co/XKkC34ZvfP https://twitter.com/i/web/status/1316361169372880903 | TheZoomit |
2020-10-14 11:00:19 | اعلان آسیب پذیری کد :CVE-2020-1472 سطح :critical رتبه :10.0 تاریخ انتشار :2020-08-17 تاریخ بروزرسانی :2020-10-… https://t.co/cm5Fz0jMUM https://twitter.com/i/web/status/1316331879331700736 | AlirezaGhahrood |
2020-10-14 10:14:14 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/FiOlmmt6Ac https://twitter.com/i/web/status/1316319674750050304 | Michal_Jarski |
2020-10-14 09:41:30 | تیم شکار تهدیدات سایبری «آکادمی راوین» در تاریخ دوم مهر، در وبیناری آسیبپذیری CVE-2020-1472 را تحلیل و نسبت به مخا… https://t.co/XtT9TrXHOc https://twitter.com/i/web/status/1316311338654871552 | RavinAcademy |
2020-10-14 09:40:49 | به زودی وبیناری با هدف بررسی روشهای شناسایی و مقابله با حملات مبتنی بر آسیبپذیری CVE-2020-1472 با استفاده از تحلیل ترافیک ارایه خواهد شد. | RavinAcademy |
2020-10-14 06:12:04 | id::1316252476627189760:RT @netsecu: https://t.co/cuXzFR3FoT CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chain | And_Or_R |
2020-10-13 21:50:25 | How do you battle against CVE-2020-1472 aka #Zerologon, the #exploit that allows an #attacker to compromise an unpa… https://t.co/DXxRq0yHhQ https://twitter.com/i/web/status/1316131997526437893 | FoluwaRewane |
2020-10-13 21:40:08 | Iran says it was hit by another CyberAttack. Some researchers believe that the attackers used CVE-2020-1472 exploit… https://t.co/riTsH6uGAh https://twitter.com/i/web/status/1316131172284592131 | NarimanGharib |
2020-10-13 20:10:10 | Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range https://t.co/LpnRiQkM9k https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html | opexxx |
2020-10-13 18:30:13 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-13 18:20:04 | #APT Gruppen nutzen CVE-2018-13379 (#Fortigate SSL-VPN) in Kombination mit CVE-2020-1472 (#Netlogon) aus, um Netzwe… https://t.co/jsVOFcGpk3 https://twitter.com/i/web/status/1316080958014185472 | certbund |
2020-10-13 13:50:04 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/1DO1rrib7K https://twitter.com/i/web/status/1316011930029416448 | Art_Capella |
2020-10-13 13:30:03 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/ulmN7DU9iX https://twitter.com/i/web/status/1316007149206605824 | nahidupa |
2020-10-13 12:30:04 | Microsoft is warning that CVE-2020-1472, a high-impact vulnerability that allows hackers to instantly take control… https://t.co/FqAVeuOpZG https://twitter.com/i/web/status/1315990987131494401 | sobca |
2020-10-13 12:20:03 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/oZ7TGeTrqd https://twitter.com/i/web/status/1315989397544734722 | BullStallcup |
2020-10-13 12:10:05 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/AHQINBbUdW https://twitter.com/i/web/status/1315986029145288704 | Lori_Riot |
2020-10-13 12:00:05 | 「FreeBuf发自 https://t.co/feGSstpIpS」【黑客利用VPN漏洞入侵美国政府选举支持系统】黑客通过结合VPN漏洞与最近的Windows CVE-2020-1472安全漏洞,入侵了美国选举支持系统,并获得了… https://t.co/KYcpfGjfg0 https://weibo.com/2028255444/JoZk53vFK https://twitter.com/i/web/status/1315983948212625413 | CNDevDaily |
2020-10-13 11:30:03 | Microsoft has observed new threat activity exploiting the critical #Zerologon #vulnerability (CVE-2020-1472) https://t.co/QPfVxYU1Is http://ow.ly/K7cX30reDf1 | ncxgroup |
2020-10-13 08:40:06 | [WARNING] A huge activity of CVE-2020-1472 #Zerologon exploitation activity is identified by @MsftSecIntel . It is… https://t.co/PX1pA4y3su https://twitter.com/i/web/status/1315933882559221762 | vFeed_IO |
2020-10-13 08:40:05 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/Rf9pbLR6jc https://twitter.com/i/web/status/1315934133877575681 | Michal_Jarski |
2020-10-13 08:40:05 | [WARNING] A huge activity of CVE-2020-1472 #Zerologon exploitation activity is identified by @MsftSecIntel . It is… https://t.co/mboUdwFChb https://twitter.com/i/web/status/1315933987785912320 | ToolsWatch |
2020-10-13 08:10:06 | id::1315910145029763073:id::1315895046160347137:id::1315891237203869699:RT @netsecu: https://t.co/cuXzFR3FoT CVE-2020-1472: Advanced Persist https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chain | And_Or_R |
2020-10-13 07:10:05 | id::1315895046160347137:id::1315891237203869699:RT @netsecu: https://t.co/cuXzFR3FoT CVE-2020-1472: Advanced Persistent Threat Actors Use Ze https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chain | And_Or_R |
2020-10-13 06:20:03 | かなり遅れ気味だけど、Zerologon(CVE-2020-1472)についてお勉強。 なかでも、IT系魔女VTuber kurenaifによる解説動画がわかりやすかった。 とくに8分11秒からの「AES-cfb8をPythonで… https://t.co/H8UvErvjwT https://twitter.com/i/web/status/1315899718820483072 | v_avenger |
2020-10-13 06:10:05 | id::1315891237203869699:RT @netsecu: https://t.co/cuXzFR3FoT CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chain | And_Or_R |
2020-10-13 05:20:04 | https://t.co/xN16fX3bJ4 CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Cha… https://t.co/gxS3NFPdla https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chain https://twitter.com/i/web/status/1315882490582704130 | netsecu |
2020-10-13 05:20:03 | 黑客利用VPN漏洞入侵美国政府选举支持系统 https://t.co/3BNdYg6fc7 黑客通过结合VPN漏洞与最近的Windows CVE-2020-1472安全漏洞,入侵了美国选举支持系统,并获得了访问权限。 https://www.freebuf.com/articles/251865.html | M157q_News_RSS |
2020-10-13 05:10:04 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/Ac05O1xFKE https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | giw_news |
2020-10-13 01:00:03 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/UumdjQixuU https://twitter.com/i/web/status/1315817143364128768 | ka0com |
2020-10-12 22:50:04 | CVE-2020-1472, mejor conocido como #Zerologon, es una nueva vulnerabilidad crítica en el Protocolo Remoto de Netlog… https://t.co/92M0u4kJe6 https://twitter.com/i/web/status/1315785295569317888 | TrendMicroLATAM |
2020-10-12 22:30:03 | CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/8tAGWyWvuE https://twitter.com/i/web/status/1315779849831829504 | _GrimSqueaker_ |
2020-10-12 19:30:04 | Al encadenar las vulnerabilidades de VPN y la reciente falla de seguridad de Windows CVE-2020-1472. La Agencia de S… https://t.co/S7zhxUePZC https://twitter.com/i/web/status/1315734127581319168 | CyberSecCorp |
2020-10-12 19:30:03 | @0xGUH CVE-2020-1472 (CRITICAL severity 10/10) with 36 PoC exploits available https://t.co/C6XrxQuOJq 🤖 https://www.cvebase.com/cve/2020/1472 | cvebase |
2020-10-12 19:30:03 | Finally got a chance to experiment with CVE-2020-1472 (Zerologon) earlier tonight. Ran the exploit, used the Impac… https://t.co/kUZqsToZbP https://twitter.com/i/web/status/1315734760040411136 | d4rkshell |
2020-10-12 19:30:02 | @0xGUH CVE-2020-1472 (CRITICAL severity 10/10) with 36 PoC exploits available https://t.co/C6XrxQuOJq 🤖 https://www.cvebase.com/cve/2020/1472 | cvebase |
2020-10-12 18:30:05 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-12 18:10:05 | @QNAP_nas are you going do do something about zerologon (CVE-2020-1472)? This is a very critical security issue, an… https://t.co/0B7IILNCXS https://twitter.com/i/web/status/1315714881144983553 | FuNKeY86165935 |
2020-10-12 12:50:03 | Microsoft reports that ransomware gangs like TA505 are now exploiting the ZeroLogon (CVE-2020-1472) vulnerability i… https://t.co/JdvGkq5lzH https://twitter.com/i/web/status/1315633576650604546 | virusbtn |
2020-10-12 07:40:05 | Russian #Cybercrime group is exploiting #Zerologon #flaw, #Microsoft warns https://t.co/vZw5Kqdasw #CVE-2020-1472… https://t.co/ExsHsw5VhP https://securityaffairs.co/wordpress/109323/hacking/ta505-zerologon-attacks.html?utm_source=feedly&utm_medium=rss&utm_campaign=ta505-zerologon-attacks https://twitter.com/i/web/status/1315556365469986817 | tribal_sec |
2020-10-12 02:10:04 | @TheDFIRReport CVE-2020-1472 (CRITICAL severity 10/10) with 36 PoC exploits available https://t.co/C6XrxQuOJq 🤖 https://www.cvebase.com/cve/2020/1472 | cvebase |
2020-10-11 22:20:03 | 🚨The Ryuk threat actors are actively exploiting ZeroLogon (CVE-2020-1472).🚨 Report coming soon. If you're looking… https://t.co/bDxF44gB2a https://twitter.com/i/web/status/1315416442758746121 | TheDFIRReport |
2020-10-11 18:30:03 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-11 15:20:02 | I have just completed this room! Check it out: https://t.co/KOMqLXTnj9 #tryhackme #CVE-2020-1472 #Active Directory… https://t.co/y3btw01a6J https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1315310862912151552 | m_siarhei |
2020-10-11 14:50:03 | ویدیوی #وبینار «بررسی و تحلیل آسیبپذیری CVE-2020-1472 موسوم به Zerologon» منتشر شد. این ویدیو رو میتونید در لینک… https://t.co/nh01IrMwqM https://twitter.com/i/web/status/1315303436108345344 | RavinAcademy |
2020-10-11 11:50:02 | #Bedrohungsmanagement mit Stormshield am Beispiel der Microsoft #Schwachstelle #Zerologon (CVE-2020-1472): unsere E… https://t.co/FfW7t29m2t https://twitter.com/i/web/status/1315257634690420736 | Stormshield_GER |
2020-10-11 11:20:03 | Best write up I’ve seen about CVE-2020-1472. A must read. https://t.co/revPFgLAA7 https://twitter.com/aaronmargosis/status/1314258652396687360 | T0P_Cyber |
2020-10-11 10:40:04 | Zero Logon - I have just completed this room! Check it out: https://t.co/IImZILoasf #tryhackme #CVE-2020-1472 via @realtryhackme DCなんも分からん… https://tryhackme.com/room/zer0logon | pzt |
2020-10-11 07:40:03 | Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/YDrXb8RKAv https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html | reverseame |
2020-10-10 18:30:06 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-10 12:40:02 | ZeroLogon explanation (CVE-2020-1472) [Arabic] https://t.co/ukGchYu02G by @KaremAliFaisal https://youtu.be/eVgEW7WhSnw | a_elmayyah |
2020-10-10 06:00:02 | Zero Logon - I have just completed this room! Check it out: https://t.co/M3Rr0Ecd2o #tryhackme #CVE-2020-1472… https://t.co/tgrHw7jQW1 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1314805747516022784 | nomizooone |
2020-10-09 20:10:03 | Zerologon (CVE-2020-1472) is more complicated than a lot of people realize. Tanium's Aaron Margosis explains why it… https://t.co/hbClU3OQY1 https://twitter.com/i/web/status/1314656963448504321 | Tanium |
2020-10-09 20:10:02 | Zerologon (CVE-2020-1472) is more complicated than a lot of people realize. Tanium's Aaron Margosis explains why it… https://t.co/Z5Jrj4JJoZ https://twitter.com/i/web/status/1314658036741484544 | smullis |
2020-10-09 20:10:02 | Zerologon (CVE-2020-1472) is more complicated than a lot of people realize. Tanium's Aaron Margosis explains why it… https://t.co/m25pgTUfcH https://twitter.com/i/web/status/1314657505314779137 | imPOSHster |
2020-10-09 18:30:07 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-09 18:20:02 | CVE-2020-1472: El exploit Netlogon que brinda control completo de su sistema Windows a los hackers fácilmente. Parc… https://t.co/bD7mOuBSqy https://twitter.com/i/web/status/1314630960474972161 | sitranscuba |
2020-10-09 17:10:06 | A new #attackerkb assesment on 'CVE-2020-1472 aka Zerologon' has been created by zeroSteiner. Attacker Value: 5 | E… https://t.co/wys2CaS6dG https://twitter.com/i/web/status/1314612832395239429 | Attackerkb_Bot |
2020-10-09 16:10:07 | A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/a0n9rsI5e3 https://twitter.com/i/web/status/1314596634035138560 | Kasperskybrasil |
2020-10-09 16:00:04 | New Zerologon Attack Variants (CVE-2020-1472) Exploitation and Detection Distilled -- https://t.co/Pxo6o5hftI https://www.securonix.com/from-zero-to-dc-new-zerologon-attack-variants-cve-2020-1472-exploitation-and-detection-distilled/ | AndreGironda |
2020-10-09 15:50:03 | Microsoft Zerologon CVE-2020-1472, DoppelPaymer Ransomware, IoT Security https://t.co/6NLN1Jjkw9 https://t.co/yxJ1bQzSXb https://bit.ly/3dbioBo | mike2003sims |
2020-10-09 15:10:03 | @microsoft reporto en el mes de agosto la vulnerabilidad #Zerologon CVE-2020-1472 que afecta a las #Servidores… https://t.co/Smu9P3VzPh https://twitter.com/i/web/status/1314583209276051457 | pihcol |
2020-10-09 12:10:13 | Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched… https://t.co/dfZYiy3jbd https://twitter.com/i/web/status/1314536109330837506 | EduAlmeidaRJ |
2020-10-09 07:10:04 | Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched… https://t.co/DSLIMsGWvn https://twitter.com/i/web/status/1314460601964347394 | EdwardErkamps |
2020-10-09 05:20:03 | New post: ZeroLogon(CVE-2020-1472) 分析与狩猎 https://t.co/MjJvswFeHs分析与狩猎/ https://reportcybercrime.com/zerologoncve-2020-1472- | digitpol_cyber |
2020-10-09 04:50:03 | ZeroLogon testing script (CVE-2020-1472) | Cyberwarzone https://t.co/K9Fs4nzA7L https://buff.ly/34IbvUl | Rikosintie |
2020-10-09 03:40:02 | CVE-2020-1472 Zerologon as a Beacon Object File https://t.co/YLSfJ1MeSS #InfoSec #CyberSecurity #CobaltStrike #ZeroLogon #CVE https://www.youtube.com/watch?v=zGf1Rat3rEk | s3xcur1ty |
2020-10-08 23:20:44 | Zero Logon - I have just completed this room! Check it out: https://t.co/BcEcOAkIC5 #tryhackme #CVE-2020-1472… https://t.co/OlITDgFFhL https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1314327638773846016 | greig_st |
2020-10-08 20:00:04 | [Vulnerability] Zerologon – CVE-2020-1472 exploited in the wild https://t.co/FdfpTYk2JS https://digitalys-mag.net/vulnerability-zerologon-cve-2020-1472-exploited-in-the-wild/ | adelhaide1 |
2020-10-08 19:40:04 | From vulnerability to exploit, why is the CVE-2020-1472 (aka #Zerologon) causing such a ruckus in #cybersecurity ci… https://t.co/icpIxSyPzL https://twitter.com/i/web/status/1314287034408804352 | mbsangster |
2020-10-08 19:00:04 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/DFmPnQKKtq… https://t.co/eMuWkClPbn http://dlvr.it/RjCzT1 https://twitter.com/i/web/status/1314277893946503170 | blueteamsec1 |
2020-10-08 18:30:07 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-08 17:40:02 | CVE-2020-1472 (#Zerologon) requires more than just patching. YES, PATCH THIS ASAP but what does the patch break tod… https://t.co/dCyrHZsMt2 https://twitter.com/i/web/status/1314258652396687360 | AaronMargosis |
2020-10-08 16:40:11 | @MsftSecIntel Microsoft's multiphase response to CVE-2020-1472 (#Zerologon) is unlike any I recall, and can underst… https://t.co/jEwkf00gfC https://twitter.com/i/web/status/1314241750693752833 | AaronMargosis |
2020-10-08 16:30:03 | Microsoft's multiphase response to CVE-2020-1472 (#Zerologon) is unlike any I recall, and can understandably confus… https://t.co/4IFn5b8J7z https://twitter.com/i/web/status/1314241275235835904 | AaronMargosis |
2020-10-08 15:00:05 | Micropatch for Zerologon (CVE-2020-1472) https://t.co/w88uwDrH5w https://t.co/TQZfLXvEYV https://www.reddit.com/r/netsec/comments/iuoieg/micropatch_for_zerologon_cve20201472/?utm_source=dlvr.it&utm_medium=twitter | techadversary |
2020-10-08 14:10:06 | Zerologon (CVE-2020-1472): SentinelOne First to Detect on the Endpoint https://t.co/keDbB94zCU https://t.co/G5DUp234DR https://j.mp/3nixU2T | morganwright_us |
2020-10-08 13:50:03 | This morning we announced via the SentinelOne Blog our ability to detect Zerologon (CVE-2020-1472), a critical Micr… https://t.co/DvhfnJbSoO https://twitter.com/i/web/status/1314200758007459843 | v_k_2014 |
2020-10-08 12:20:03 | No ultimo vídeo eu apresento o ZeroLogon (CVE-2020-1472) que permite explorar uma vulnerabilidade de elevação de pr… https://t.co/ArHc4MaojX https://twitter.com/i/web/status/1314176367009968129 | DanielDonda |
2020-10-08 12:10:05 | The #Zerologon issue (CVE-2020-1472) is being actively exploited in the wild. You need to patch your domain control… https://t.co/0hvLsmhmjc https://twitter.com/i/web/status/1314173958023983105 | brycea |
2020-10-08 08:10:03 | Grâce au Patch Tuesday d’août #Microsoft a corrigé plusieurs vulnérabilités dont CVE-2020-1472. La vulnérabilité du… https://t.co/V8pYv7hUJp https://twitter.com/i/web/status/1314113421483356163 | kasperskyfrance |
2020-10-08 08:00:06 | New post from https://t.co/uXvPWJy6tj (Microsoft Windows unknown vulnerability [CVE-2020-1472]) has been published… https://t.co/PGxzOgz6gi http://www.sesin.at https://twitter.com/i/web/status/1314110838765125632 | WolfgangSesin |
2020-10-08 08:00:04 | New post from https://t.co/9KYxtdZjkl (Microsoft Windows unknown vulnerability [CVE-2020-1472]) has been published… https://t.co/1OxshRB2QD http://www.sesin.at https://twitter.com/i/web/status/1314110847715811328 | www_sesin_at |
2020-10-08 08:00:03 | Microsoft Windows unknown vulnerability [CVE-2020-1472]: A vulnerability was found in Microsoft Windows (affected… https://t.co/RDQ68pLdcZ https://goo.gl/fb/nK3PH9 | threatmeter |
2020-10-08 02:30:02 | 本当にどうでもいいのだけど、MicrosoftのCVE-2020-1472(ZeroLogon)のページの「用語集」に"広告"の項目がある。用語:広告 で 定義:ActiveDirectory となってるんだけど、そもそも"広告"… https://t.co/LmkcoBxE13 https://twitter.com/i/web/status/1314029815381385216 | hogehuga |
2020-10-07 23:50:04 | #CyberAttacks: #ZeroLogon Is Now Detected By #MicrosoftDefender For Identity (CVE-2020-1472 #Exploitation) -… https://t.co/m3GHpVul3I https://twitter.com/i/web/status/1313988878563450887 | Totocellux |
2020-10-07 21:50:04 | Ahhhh no wonder everyone was losing their collective shit about CVE-2020-1472 and needed absolute confirmation that… https://t.co/iVXlBZlwX1 https://twitter.com/i/web/status/1313959376806391810 | bkmichaelg |
2020-10-07 21:30:05 | From vulnerability to exploit, why is the CVE-2020-1472 (aka #Zerologon) causing such a ruckus in #cybersecurity ci… https://t.co/Hm4XFpPo2U https://twitter.com/i/web/status/1313952247571787785 | eSentire |
2020-10-07 21:30:03 | Zero Logon - I have just completed this room! Check it out: https://t.co/UWeZpnWkFw #tryhackme #CVE-2020-1472… https://t.co/Ty6sNLVDgC https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1313953040668536833 | esmerlinjm |
2020-10-07 21:10:02 | #cve20201472 - CVE-2020-1472 CVSS 10.0 Demo en Core Impact contra un DC Windows 2019 #zerologon https://t.co/PosYkJ3zql https://lnkd.in/gRZwAzM | h_r_torres |
2020-10-07 20:10:02 | @MSFT365Status Are you turning enforcement mode on for CVE-2020-1472 and half your servers are falling off the doma… https://t.co/dj6R3WwVkx https://twitter.com/i/web/status/1313934554277834753 | bigfoot780 |
2020-10-07 19:40:04 | Active exploitation of Zerologon (CVE-2020-1472) is noted by @Microsoft by Iranian threat group they track as “Merc… https://t.co/9BsxHbXdQQ https://twitter.com/i/web/status/1313925014408712192 | AdroitCyber |
2020-10-07 19:20:03 | Zero Logon - I have just completed this room! Check it out: https://t.co/13hXE00RQk #tryhackme #CVE-2020-1472… https://t.co/oYMfweZErM https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1313919605702754305 | rogerss_25 |
2020-10-07 18:30:07 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-07 17:00:06 | Zero Logon - I have just completed this room! Check it out: https://t.co/wK5odnrHoF #tryhackme #CVE-2020-1472… https://t.co/5VwhgN4boz https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1313886237439127552 | pidugusundeep |
2020-10-07 16:20:02 | Como saber si tu entorno de Active Directory esta protegido contra #zerologon CVE-2020-1472 con Core Impact https://t.co/B2OFXkaSoj https://lnkd.in/eu3cFVt | h_r_torres |
2020-10-07 14:30:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Communit… https://t.co/WZmZdDtWc4 https://twitter.com/i/web/status/1313846803272351746 | nichii_a |
2020-10-07 09:10:05 | MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active… https://t.co/ICEFKnvJr9 https://twitter.com/i/web/status/1313766903391883265 | aburassen2 |
2020-10-07 08:40:05 | File-Manager plugin(CVE-2020-25213)とZerologon(CVE-2020-1472)の脆弱性を使った攻撃シナリオ | Using a WordPress flaw to leverage zer… https://t.co/xuspcTb8jS https://twitter.com/i/web/status/1313758801917435905 | muumuubokujo |
2020-10-07 00:50:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Community https://t.co/jri7MESAOK https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034 | freude710 |
2020-10-06 23:50:03 | Test script for MS Zerologon bug. CVE-2020-1472 https://t.co/mgp52XkIPT https://github.com/SecuraBV/CVE-2020-1472/blob/master/zerologon_tester.py | r00tpgp |
2020-10-06 22:00:11 | We’re seeing more activity leveraging the CVE-2020-1472 exploit (ZeroLogon). A new campaign shrewdly poses as softw… https://t.co/6UYRpPBneC https://twitter.com/i/web/status/1313598440719355904 | MsftSecIntel |
2020-10-06 22:00:04 | We’re seeing more activity leveraging the CVE-2020-1472 exploit (ZeroLogon). A new campaign shrewdly poses as softw… https://t.co/JMtmlxnD1E https://twitter.com/i/web/status/1313599305790500864 | dondiwest |
2020-10-06 21:40:07 | CVE-2020-1472 "ZeroLogon" by researcher Tom Tervoort has 35+ PoC exploits. This allows attackers to impersonate any… https://t.co/4UFzkTmASH https://twitter.com/i/web/status/1313593490966638592 | cvebase |
2020-10-06 19:20:02 | Drop everything & go patch CVE-2020-1472, aka “Zerologon.” 👀🔐 Our latest Threat Labs podcast explains why.… https://t.co/gTTlk81gk0 https://twitter.com/i/web/status/1313558936654688256 | JuniperNetworks |
2020-10-06 18:30:10 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-06 17:50:03 | Microsoft warns that the MERCURY APT has been actively exploiting CVE-2020-1472 in campaigns for the past two weeks… https://t.co/4IOSARt0nr https://twitter.com/i/web/status/1313535666815291392 | iamTdivyesh |
2020-10-06 17:10:04 | If you can't patch CVE-2020-1472 (#Zerologon) because your domain controllers are Windows Server 2008 R2, @0patch h… https://t.co/cF2BJ9Qakp https://twitter.com/i/web/status/1313526401778225152 | mkolsek |
2020-10-06 16:20:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Communit… https://t.co/3gniUTD94U https://twitter.com/i/web/status/1313513861950042112 | Go_NGYO |
2020-10-06 16:10:05 | A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/1FkR4B6ddz https://twitter.com/i/web/status/1313509428696580098 | Kasperskybrasil |
2020-10-06 15:50:02 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/BGXW3vnHx6 https://www.secura.com/blog/zero-logon | K1N0SA |
2020-10-06 15:20:04 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/Cun4TmcjeR… https://t.co/aIbIdPobHO https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3yKcYcBSpg.twitter https://twitter.com/i/web/status/1313498722630684672 | DaveKawula |
2020-10-06 13:20:02 | “ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Communi… https://t.co/3VbL6HWHjn https://twitter.com/i/web/status/1313468159773433858 | modokey |
2020-10-06 12:40:05 | MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon): https://t.co/fMMEg9UMSa https://twitter.com/MsftSecIntel/status/1313246337153077250 | 780thC |
2020-10-06 12:30:04 | Microsoft warns that the Iran-linked MuddyWaters group is exploiting the ZeroLogon vulnerability (CVE-2020-1472) in… https://t.co/pt3H5s5Hwx https://twitter.com/i/web/status/1313454717520019456 | virusbtn |
2020-10-06 10:10:02 | The #vulnerability CVE-2020-1472 aka #Zerologon is being exploited by #cyberespionage group #MuddyWater.… https://t.co/qEQkVOY5FW https://twitter.com/i/web/status/1313419742963814406 | twelvesec |
2020-10-06 09:40:04 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472… https://t.co/hDbKNFkinR https://twitter.com/i/web/status/1313411711425101824 | TWCERTCC |
2020-10-06 08:00:03 | ZeroLogon Exploit - Abusing CVE-2020-1472 (Way Too Easy!) https://t.co/KaiJVsw0SB http://dlvr.it/Rj2C7C | netsecstudents |
2020-10-06 07:40:02 | CVE-2020-1472を突くネットワークIDS/IPSのシグネチャですが、オリジナルで書きかきする際の参考情報です。 | papa_anniekey |
2020-10-06 06:20:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/zergJF2OGT https://amzc.news/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve-2020-1472-exploitation | pdominjon |
2020-10-06 05:40:02 | CVE-2020-1472 DCERPC NetrServerReqChallenge (Opnum 4) (\x00){8}$ not include Auth type == 68 でも平文だとauth type==68はリストないからどうするか | papa_anniekey |
2020-10-06 05:30:04 | new video just dropped by thecybermentor ... ZeroLogon Exploit - Abusing CVE-2020-1472 (Way Too Easy!)... watch, li… https://t.co/8CglR3Oa6F https://twitter.com/i/web/status/1313348529507782657 | infenet |
2020-10-06 05:30:03 | Zerologon Exploit- Abusing CVE-2020-1472 tutorial here. #Zerologon #exploit #ad #Windows10 https://t.co/3C8x3slcQA https://youtu.be/6xMGsdD-ArI | ashrav_jain |
2020-10-06 03:10:03 | “ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Communi… https://t.co/nTKty9kPi4 https://twitter.com/i/web/status/1313314982717648896 | tukanana |
2020-10-06 00:20:04 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/G8T0EfSQYk https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3u14WfeSyI.twitter | ka0com |
2020-10-05 23:10:04 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - https://t.co/kGmagBvXDY https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034?WT.mc_id=M365-MVP-4038268 | directorcia |
2020-10-05 23:00:03 | MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active… https://t.co/d1DJ7pYwWi https://twitter.com/i/web/status/1313252181911445504 | dondiwest |
2020-10-05 23:00:03 | Make sure to patch for CVE-2020-1472 https://t.co/bBWcysiNaa https://twitter.com/msftsecintel/status/1313246337153077250 | s_adachi |
2020-10-05 22:40:13 | MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active… https://t.co/lXvOBomFoq https://twitter.com/i/web/status/1313246337153077250 | MsftSecIntel |
2020-10-05 21:20:03 | CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability | An elevation of p https://t.co/UCpwYZzbMH http://ow.ly/1Fz130rdu15 | JayFerron |
2020-10-05 20:50:49 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/qVrfImlRLc https://twitter.com/i/web/status/1313170026640408584 | velez1066 |
2020-10-05 18:40:13 | A spike in exploitation attempts against the #Microsoft #vulnerability CVE-2020-1472, known as the #Zerologon #bug,… https://t.co/NpPZkY61wl https://twitter.com/i/web/status/1313184817731821570 | jonesit_sf |
2020-10-05 18:30:06 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-05 16:20:03 | Reminder about mitigating against the #Zerologon security vulnerability. Patch today! CVE-2020-1472 | Netlogon Elev… https://t.co/Q2fD2QYPxp https://twitter.com/i/web/status/1313150738206535680 | adaptiva |
2020-10-05 15:20:03 | CVE-2020-1472 and @CiscoSecure •Orbital in Action: https://t.co/mEU4azJy5X •Exploiting the Domain Controller:… https://t.co/Ze1vdNDFyt https://youtu.be/BEJubBXoYro https://twitter.com/i/web/status/1313135141607428098 | FE80CC1E |
2020-10-05 14:10:03 | Une augmentation des tentatives d'exploitation contre la vulnérabilité Microsoft CVE-2020-1472, connue sous le nom… https://t.co/1HJNQnlQtS https://twitter.com/i/web/status/1313117904850817025 | TechSecuriteNew |
2020-10-05 12:00:05 | CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/MtkPOH1dCa @YouTubeより https://youtu.be/1h_wlMWwyB4 | py_kanade |
2020-10-05 12:00:03 | Network Detection for ZeroLogon (CVE-2020-1472) #NetworkDetection #CVE #Exploit #Vulnerability #PenTest #InfoSec… https://t.co/KnlWiW5ZD7 https://twitter.com/i/web/status/1313084871657521154 | itsoftgmbh |
2020-10-05 11:30:02 | Read Tanium's guidance on how to Find and Remediate “Zerologon” (CVE-2020-1472) Updated on 9/28 https://t.co/wlzNLjEfrK https://community.tanium.com/s/article/How-Tanium-Can-Help-Remediate-Zerologon-CVE-2020-1472 | mtravers |
2020-10-05 09:10:04 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/aZXYXmNtYH #MSFTAdvocate https://lnkd.in/dbYE8KW | MarcoDalPino |
2020-10-05 09:10:03 | @wdormann When scanning for patches on Tuesday August related to CVE-2020-1472 vulnerabilities, the following list… https://t.co/6zQUe9NN20 https://twitter.com/i/web/status/1313043143294550016 | kwi01072 |
2020-10-05 07:10:05 | #ZeroLogon is now detected by #MicrosoftDefender for Identity (CVE-2020-1472 exploitation)… https://t.co/Aky7uOTQc2 https://twitter.com/i/web/status/1313011329662431234 | ThomasKurth_ch |
2020-10-05 06:40:07 | New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/63OiucLjmL https://lnkd.in/d6_VA2v | Macksta2 |
2020-10-05 03:30:02 | ชำแหละ Zerologon (CVE-2020-1472) https://t.co/EPGBiS1b4C CR: Witsarut L. #ISMTechnology #ISMSharingContent https://medium.com/incognitolab/%E0%B8%8A%E0%B8%B3%E0%B9%81%E0%B8%AB%E0%B8%A5%E0%B8%B0-zerologon-cve-2020-1472-cabe92baa8e5 | ISMTechnology |
2020-10-05 02:00:02 | Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/APxBUOwXix https://t.co/qcIhPfQOQ4 https://www.reddit.com/r/netsec/comments/itmukx/instantly_become_domain_admin_by_subverting/?utm_source=dlvr.it&utm_medium=twitter | techadversary |
2020-10-04 23:00:03 | “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/rrUgUlCYWd https://htn.to/PaWAkRM8md | kwdnet |
2020-10-04 23:00:02 | “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/rrUgUllo4F https://htn.to/PaWAkRM8md | kwdnet |
2020-10-04 21:40:03 | #sharepoint ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft T… https://t.co/XknU5ukCJN https://twitter.com/i/web/status/1312869510668484613 | ricardo_calejo |
2020-10-04 21:00:03 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 #infosec #soc #ciso https://t.co/NNGeVYTEP5 https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | opexxx |
2020-10-04 18:30:06 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-04 16:20:02 | Did you know? ZeroLogon ( (CVE-2020-1472 ) is now detected by Microsoft Defender. https://t.co/oSggZrwfoy | JosephZaheer |
2020-10-04 14:10:02 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/o7iYGHODua https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3kXvqSNsJs.twitter | HackCoOrg |
2020-10-04 13:30:02 | #CVE #Netlogon CVE-2020-1472 通過Netlogon獲得管理員權限 https://t.co/kUezwV2pL6 https://wiki.ixinian.com/xi-tong-lou-dong/windows/cve20201472-tong-guo-netlogon-huo-de-guan-li-yuan-quan-xian | Acardia2020 |
2020-10-04 10:10:04 | Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched… https://t.co/YwcJF7mvRr https://twitter.com/i/web/status/1312693962558386176 | cdnjmac |
2020-10-04 06:10:03 | Did you know? #ZeroLogon is now detected by Microsoft Defender for Identity - ex Azure ATP (CVE-2020-1472 exploitat… https://t.co/lVoFknVCgZ https://twitter.com/i/web/status/1312633693068984320 | ArtyomSinitsyn |
2020-10-03 20:10:02 | Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range https://t.co/nNZjRgYFux https://lnkd.in/eak44RR | MMShippy |
2020-10-03 18:30:05 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-03 16:10:03 | A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/UwfGOiDETr https://twitter.com/i/web/status/1312422544851562497 | Kasperskybrasil |
2020-10-03 15:50:02 | Cisco Endpoint AMP: Orbital Threat Hunting - CVE-2020-1472 Monitoring- Zerologon Vulnerability https://t.co/mEU4azJy5X https://youtu.be/BEJubBXoYro | FE80CC1E |
2020-10-03 13:30:02 | A critical CVSS:10 vulnerability (CVE-2020-1472) in the Microsoft Netlogon process. Zerologon Arabic art:… https://t.co/qKzaYfQMrZ https://twitter.com/i/web/status/1312383901025865731 | Sud0root |
2020-10-03 13:10:03 | Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range https://t.co/H8lKTm60Ox https://lnkd.in/ewKMr_H | fwijnholds |
2020-10-03 05:00:02 | New post: ZeroLogon(CVE-2020-1472) 漏洞的攻击与防御策略(下) https://t.co/MjJvswFeHs漏洞的攻击与防御策略(下)/ https://reportcybercrime.com/zerologoncve-2020-1472- | digitpol_cyber |
2020-10-03 01:50:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/gbeGbvLjvI https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3fXGVc19wA.twitter | matthew_sec |
2020-10-02 18:30:08 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-02 16:40:03 | Zerologon is the name that has been given to a vulnerability identified in CVE-2020-1472. Due to the flaw in the lo… https://t.co/npWZ2WVJpA https://twitter.com/i/web/status/1312069179789336576 | CERTstation |
2020-10-02 15:20:05 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/f1cOwDSncN https://twitter.com/i/web/status/1312047335267086338 | deepwatch_sec |
2020-10-02 14:10:04 | Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched… https://t.co/khGKz6uWwY https://twitter.com/i/web/status/1312029593113690113 | rbecwar |
2020-10-02 13:10:04 | reminder that - CVE-2020-1472 is going to make your day very bad if you can't prevent, detect or respond fast enuf… https://t.co/gSo2GdwutP https://twitter.com/i/web/status/1312016087576346626 | UK_Daniel_Card |
2020-10-02 12:50:07 | 'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/JfOMF89JoA https://twitter.com/i/web/status/1312010185007796224 | dansantanna |
2020-10-02 10:30:03 | Microsoft's security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched or lack… https://t.co/5t74UJ8zfJ https://twitter.com/i/web/status/1311974784339783681 | rhensenbu |
2020-10-02 07:50:02 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/6UAF7Xz2MX… https://t.co/MofrChlvCs https://ift.tt/2Sjo4PO https://twitter.com/i/web/status/1311936374531072000 | AIHammer |
2020-10-02 07:20:05 | #LIVE Webinar on Zerologon Vulnerability (CVE-2020-1472) : Technical Analysis and Detection Register to join… https://t.co/ooGqm1pXAU https://twitter.com/i/web/status/1311926506097180675 | sirajs0l |
2020-10-02 07:10:04 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/8kFi30Qswx https://ift.tt/2Sg2f3V | eyalestrin |
2020-10-02 02:20:04 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/WzhJz9H5YL https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | ohhara_shiojiri |
2020-10-02 00:40:06 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/IZxHMl6ezm https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3Z1NieYxxo.twitter | HackCoOrg |
2020-10-02 00:40:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/G3N4d6Tp4k <… https://t.co/0BgBf4Df60 https://buff.ly/36qDyd5 https://twitter.com/i/web/status/1311827246244605954 | bschorr |
2020-10-01 23:40:03 | Network Detection for ZeroLogon (CVE-2020-1472) https://t.co/gwqdd49E8m #Pentesting #CVE #Vulnerability #Exploit… https://t.co/sJmQZkLDPp https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/network-detection-for-zerologon-cve-2020-1472/ https://twitter.com/i/web/status/1311811173512347651 | ptracesecurity |
2020-10-01 22:50:03 | ZeroLogon (CVE-2020-1472) https://t.co/gOilcqccsR via @YouTube https://youtu.be/U_1RTCl63hc | DanielDonda |
2020-10-01 22:30:04 | ZeroLogon (CVE-2020-1472) https://t.co/gOilcqccsR https://youtu.be/U_1RTCl63hc | DanielDonda |
2020-10-01 22:20:04 | Microsoft today shared some exploit research on its Windows Server Netlogon vulnerability (CVE-2020-1472), with hin… https://t.co/ND4Q2Cd0b3 https://twitter.com/i/web/status/1311791198772711424 | kurmac |
2020-10-01 21:20:04 | Interesting approach to patch Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472). Amazing micropatch w… https://t.co/vT7zKopzJm https://twitter.com/i/web/status/1311777074160504833 | FAllendesF |
2020-10-01 20:50:13 | CVE-2020-1472 = IDDQD. Solo para grupos de riesgo | rsanchez3270 |
2020-10-01 20:20:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Community https://t.co/HFBexa5cxO https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034 | opexxx |
2020-10-01 19:40:03 | Zerologon (CVE-2020-1472): SentinelOne First to Detect on the Endpoint https://t.co/oD9pNAzzE1 https://s1.ai/wHkPHm | brittradams |
2020-10-01 19:10:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/Dl56XdsNzM https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3YpE2v42h4.twitter | arkka1 |
2020-10-01 19:00:06 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Community https://t.co/xReP4F6YRr https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034 | bartvvugt |
2020-10-01 19:00:05 | @c3di1 CVE-2020-1472 | 7374657665_ |
2020-10-01 18:40:10 | Customers with Microsoft 365 Defender can get additional guidance for CVE-2020-1472 Netlogon Elevation of Privilege… https://t.co/WzJVdEKnAy https://twitter.com/i/web/status/1311735621900214273 | RavivTamir |
2020-10-01 18:30:08 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-10-01 18:30:07 | In case you missed it - ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/tWsxm07QhA https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034 | RavivTamir |
2020-10-01 17:30:04 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/mkUcKC2amh… https://t.co/3CEzj9OCph https://buff.ly/30qzINk https://twitter.com/i/web/status/1311717834695868416 | ITOpsTalk |
2020-10-01 17:00:04 | New Zerologon (CVE-2020-1472) signatures added to the Sagan rule sets. Log analysis & packet analysis signatures… https://t.co/0ePh7m0h8q https://twitter.com/i/web/status/1311711560319021057 | Quadrantsec |
2020-10-01 16:40:07 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/QDRgurhSfv #MSFTAdvocate https://lnkd.in/d78Eihr | MarcoDalPino |
2020-10-01 16:20:03 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/MnpbClFVg3 https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | PVynckier |
2020-10-01 15:50:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/e9ZmoMcRbz… https://t.co/WX9FZN13z6 https://buff.ly/30qzINk https://twitter.com/i/web/status/1311692862011117573 | MsftTechNews |
2020-10-01 15:30:03 | 【読んだ】ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog ( https://t.co/xQiAiY60wA ) https://ift.tt/2S3UpKx | nonokao |
2020-10-01 14:20:06 | La vulnérabilité CVE-2020-1472 du protocole #Netlogon, alias #Zerologon, permet aux cybercriminels de pirater les c… https://t.co/W99WuPxLnU https://twitter.com/i/web/status/1311670132461182976 | kasperskyfrance |
2020-10-01 13:50:02 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/QhetUC8X1S https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | L4rryC4rson |
2020-10-01 12:20:06 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsof... (https://t.co/c5Y8Y3KmDT) https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034 | WhatDigital |
2020-10-01 12:00:05 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/InJBhZljej #MVPBuzz https://bit.ly/2Gex86k | jcastanedacano |
2020-10-01 12:00:04 | We've published new details on in the wild ZeroLogon (CVE-2020-1472) detection at Microsoft - including some huntin… https://t.co/M3Qv9e2Hk1 https://twitter.com/i/web/status/1311635550747721729 | GossiTheDog |
2020-10-01 12:00:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/XTjKa4Y3WN #Microsoft https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034 | MSITProNews |
2020-10-01 11:50:03 | ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/XJlW1ngYW1 http://dlvr.it/RhkYPx | EverythingMS |
2020-10-01 11:40:02 | めちゃわかりやすい RT CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/oaOPwOwUZR @YouTubeより https://youtu.be/1h_wlMWwyB4 | nakayoshi7 |
2020-10-01 11:10:03 | CVE-2020-1472: Microsoft publiziert verständliche Patch-Anleitung "Zerologon" ist eine höchst kritische Lücke, aber… https://t.co/XsZ0Eh7vle https://twitter.com/i/web/status/1311621946640130048 | inside_channels |
2020-10-01 11:10:03 | New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/uCCJSSEmVc https://lnkd.in/eF2E9rT | MrBarryBrown |
2020-10-01 10:40:04 | CVE-2020-1472: Microsoft publiziert verständliche Patch-Anleitung "Zerologon" ist eine höchst kritische Lücke, aber… https://t.co/jHMqt1Ldju https://twitter.com/i/web/status/1311614400718086145 | inside_it |
2020-10-01 08:50:05 | ‼️ Cyber Alert ‼️ Microsoft have identified vulnerabilities affecting Microsoft Windows Netlogon, or CVE-2020-1472.… https://t.co/LrxsP3nAj6 https://twitter.com/i/web/status/1311587273998295040 | DurhamCyber |
2020-10-01 07:30:03 | TheHackersNews: LIVE Webinar on Zerologon Vulnerability (CVE-2020-1472) : Technical Analysis and Detection Registe… https://t.co/4nX41aqK4o https://twitter.com/i/web/status/1311566649892442118 | B01Group |
2020-10-01 07:10:02 | @TheHackersNews : LIVE Webinar on Zerologon Vulnerability (CVE-2020-1472) : Technical Analysis and Detection Regis… https://t.co/0zMFWsaRlU https://twitter.com/i/web/status/1311562059881099266 | byHoRRoR |
2020-10-01 04:10:02 | CVE-2020-1472 aka Zerologon | From Nobody to Admin https://t.co/fKmeHdELO0 https://buff.ly/3cKCYbt | safepassme |
2020-10-01 04:00:03 | Windows event log errors related to CVE-2020-1472 (Netlogon/ZeroLogon): There are three categories of events: 1. E… https://t.co/2IOFuTGcEh https://twitter.com/i/web/status/1311514443562450946 | FAllendesF |
2020-09-30 23:10:03 | Late again, but still ^_^ Older Vulnerabilities with exploits - “#Zerologon” #Netlogon RCE (CVE-2020-1472) - EoPs i… https://t.co/mBzM2L0enM https://twitter.com/i/web/status/1311442811515023363 | leonov_av |
2020-09-30 21:30:04 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472… https://t.co/oidQMGwjPy https://twitter.com/i/web/status/1311417034383687681 | bschorr |
2020-09-30 21:00:16 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/dGTMFxQ03Y https://twitter.com/i/web/status/1311408014574919681 | deepwatch_sec |
2020-09-30 18:30:08 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-30 18:00:03 | “A spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, known as the Zerologon bug, co… https://t.co/JTJZBJ95u0 https://twitter.com/i/web/status/1311365195307134981 | cyberprotectgrp |
2020-09-30 17:40:07 | A different way of abusing Zerologon (CVE-2020-1472) (via @_dirkjan) https://t.co/9eDk3OkUoV https://buff.ly/33SSttS | lordman1982 |
2020-09-30 17:40:03 | Q re CVE-2020-1472 #Zerologon: the MS patch defines 5 new events that can be reported in a DC's System event log to… https://t.co/Bf1CYFLT5g https://twitter.com/i/web/status/1311359770826362881 | AaronMargosis |
2020-09-30 17:10:11 | So cool to be the first endpoint vendor to introduce detection for #ZeroLogon (CVE-2020-1472). Watch the demo:… https://t.co/uofooJ72rj https://twitter.com/i/web/status/1311350555814420485 | MigoKed |
2020-09-30 17:00:10 | CVE-2020-1472 Zerologon attack helps hackers to take over corporate networks. Microsoft warned that malicious cyber… https://t.co/Cag5zJdNkm https://twitter.com/i/web/status/1311348793045065728 | the_encrypt |
2020-09-30 16:50:10 | SentinelOne : ⚡ Live: SentinelOne the ONLY endpoint security vendor to detect #Zerologon (CVE-2020-1472). Our paten… https://t.co/r7vmltTJda https://twitter.com/i/web/status/1311345666204065796 | BThurstonCPTECH |
2020-09-30 16:50:03 | "SentinelOne the ONLY endpoint security vendor to detect #Zerologon (CVE-2020-1472). " *stares at thousands of blo… https://t.co/WFCFFrsTgI https://twitter.com/i/web/status/1311347272324722688 | GossiTheDog |
2020-09-30 16:40:16 | ⚡ Live: SentinelOne the ONLY endpoint security vendor to detect #Zerologon (CVE-2020-1472). Our patented behavioral… https://t.co/YE3RSFYdPu https://twitter.com/i/web/status/1311343440647434241 | SentinelOne |
2020-09-30 16:40:10 | #Zerologon (CVE-2020-1472): .@SentinelOne First to Detect on the Endpoint https://t.co/1QogUOG8G2 https://s1.ai/wHkPHm | GutmanYotam |
2020-09-30 16:40:03 | Zerologon (CVE-2020-1472): SentinelOne First to Detect on the Endpoint https://t.co/KrF3tunScG https://bit.ly/34aniKJ | pigram86 |
2020-09-30 16:10:07 | A week after active exploits of CVE-2020-1472 first appeared, exploitation attempts continue to rise. CISA has alre… https://t.co/AEgfBdfK95 https://twitter.com/i/web/status/1311335018799730689 | AutomoxApp |
2020-09-30 16:10:06 | A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/c2ej79TfRS https://twitter.com/i/web/status/1311335286115373057 | Kasperskybrasil |
2020-09-30 16:10:03 | #vulnerabilidad Zerologon, nuevo CVE-2020-1472 recientemente descubierto, permite al atacante aprovechar el algorit… https://t.co/MCSAIG5LSX https://twitter.com/i/web/status/1311337164920283142 | TrendMicroES |
2020-09-30 15:30:04 | LIVE Webinar on Zerologon Vulnerability (CVE-2020-1472) : Technical Analysis and Detection Register to join… https://t.co/eKkR3j9Mnw https://twitter.com/i/web/status/1311326457075912704 | TheHackersNews |
2020-09-30 15:30:03 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/MiE5SSKJxf https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | RRalstonAgile |
2020-09-30 15:10:05 | Last month, #Microsoft released a patch for critical vulnerability CVE-2020-1472, also known as the Zerologon vulne… https://t.co/VZtOkGA3N0 https://twitter.com/i/web/status/1311320035013656576 | kaspersky |
2020-09-30 15:10:05 | Microsoft clarifies patch confusion for Windows Zerologon flaw (CVE-2020-1472) via @BleepinComputer #Proficio… https://t.co/QWskLApk9S https://twitter.com/i/web/status/1311319903534628866 | proficioinc |
2020-09-30 15:10:04 | #CVE-2020-1472 #ZeroLogon Alert: ‘Critical’ Windows Vulnerability Needs Your Attention. The @Keysight_ATI team put… https://t.co/lz9CIPw50E https://twitter.com/i/web/status/1311320963846414337 | KeysightNAS |
2020-09-30 15:00:03 | More on CVE-2020-1472 and patching DC's. ISC Stormcast For Wednesday, September 30th 2020 https://t.co/xkoEGPVXRW… https://t.co/TTDx8qTkoe https://isc.sans.edu/podcastdetail.html?id=7 https://isc.sans.edu/diary/rss/26618 | L4rryC4rson |
2020-09-30 14:10:03 | 話題のZerologon(CVE-2020-1472)の悪用可能性指標は、悪用例が確認されたとの発表があった現在も「2 - 悪用される可能性は低い」のままです。 https://t.co/iuhlJRMLI2 https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2020-1472 | am7cinnamon |
2020-09-30 12:10:05 | “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/ehV5s05eb5 https://htn.to/2hsXZweVeW | rokumai |
2020-09-30 12:00:02 | CVE-2020-1472 is a Windows vulnerability that allows an unauthenticated device to compromise your Microsoft Windows… https://t.co/p7a7scQGkq https://twitter.com/i/web/status/1311274589977227268 | SolutionsPT |
2020-09-30 11:40:04 | What You Need To Know About Zerologon: Microsoft released an update for CVE-2020-1472 (now known as Zerologon) on A… https://t.co/cURBg5pctA https://twitter.com/i/web/status/1311267818331992065 | shah_sheikh |
2020-09-30 11:00:05 | We have updated the KB article for CVE-2020-1472 Netlogon to provide clarity on customers actions to ensure they ar… https://t.co/2miew9mU7Q https://twitter.com/i/web/status/1311256996730068992 | ArtyomSinitsyn |
2020-09-30 09:40:04 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/NOuT5dKOt7 #security https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | G76whizkidz |
2020-09-30 08:50:03 | Technical details of CVE-2020-1472 (Zerologon) https://t.co/JnrBSOexpr #zerologon #cve #crypto #aescfb https://www.secura.com/pathtoimg.php?id=2055 | philomath213 |
2020-09-30 07:40:04 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/AWTafZKdQg https://twitter.com/i/web/status/1311207490663649281 | BharatM15try |
2020-09-30 05:20:03 | POCでさえもログから攻撃発生の判別が厳しいのに、耳つかったらもっとわかりにくいじゃないか…とりあえず言える事は、とっととパッチあてなさい、ですね。CVE-2020-1472 https://t.co/91oEspCrAf | papa_anniekey |
2020-09-30 03:50:04 | ZeroLogon AD DC CVSS of 10 CVE-2020-1472 #cve20201472 https://t.co/DKPR5uQin4 https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/ | NicholasLeader |
2020-09-30 03:20:03 | Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/yp4iupFK0k https://t.co/ppOWGRBFe2 https://www.reddit.com/r/netsec/comments/irwd3d/test_tool_for_cve20201472_dc_auth_bypass/?utm_source=dlvr.it&utm_medium=twitter | techadversary |
2020-09-30 03:00:02 | モストオブわかりやすいZerologon ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/LT9odEeKo5 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | maguro_infra |
2020-09-30 01:10:03 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/A23yAzrEDu https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | Pyo0072 |
2020-09-30 00:40:03 | Acabei de testar o "Zerologon: CVE-2020-1472" em um ambiente de teste e acho que vale um vídeo de uns 5 minutos não… https://t.co/FXbbNrqhLY https://twitter.com/i/web/status/1311102871803490304 | DanielDonda |
2020-09-29 22:30:06 | @TalosSecurity is tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an e… https://t.co/jdJu8KjYBq https://twitter.com/i/web/status/1311068898670731269 | jc_vazquez |
2020-09-29 22:30:05 | Microsoft specifies patching of the Netlogon vulnerability (CVE-2020-1472) https://t.co/NLYTHJOaL6 #CVE-2020-1472… https://t.co/sxOMye4AQ0 https://borncity.com/win/?p=16133 https://twitter.com/i/web/status/1311069207979790336 | etguenni |
2020-09-29 22:20:05 | Microsoft präzisiert das Patchen der Netlogon-Schwachstelle (CVE-2020-1472) https://t.co/IKMLXaIzlh #CVE-2020-1472… https://t.co/Uzuej3RtFC https://www.borncity.com/blog/2020/09/30/microsoft-przisiert-das-patchen-der-netlogon-schwachstelle-cve-2020-1472/ https://twitter.com/i/web/status/1311065835000258562 | etguenni |
2020-09-29 21:20:03 | Learn how to detect the CVE-2020-1472 Zerologon exploitation without signatures or agents, using @ExtraHop Reveal(x… https://t.co/vzLGRBMeQg https://twitter.com/i/web/status/1311051678809026561 | ToHyphenOrNot |
2020-09-29 20:50:08 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた https://t.co/nyLZ9n0W9V https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | 01ra66it |
2020-09-29 20:50:07 | A thread of activity I've seen around Zerologon/CVE-2020-1472, if it helps anybody. Mute conversation away. | GossiTheDog |
2020-09-29 20:50:07 | 脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 https://t.co/1WmYs9420p https://blog.trendmicro.co.jp/archives/26206 | 01ra66it |
2020-09-29 18:30:07 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-29 16:20:03 | Microsoft's #patch for the CVE-2020-1472 #vulnerability in the #Netlogon protocol aka #Zerologon is an update you s… https://t.co/vBrZSXi6um https://twitter.com/i/web/status/1310977050686230533 | lgomezperu |
2020-09-29 16:10:04 | #Microsoft's patch for the CVE-2020-1472 vulnerability in the Netlogon protocol aka Zerologon is an update you shou… https://t.co/3KVPXYhw5d https://twitter.com/i/web/status/1310972750727729159 | kaspersky |
2020-09-29 14:30:05 | .@NCSC UK are advising UK organisations to patch for CVE-2020-1472 aka Zerologon, and on detection details. https://t.co/GcRqfGsLBz https://www.ncsc.gov.uk/news/alert-organisations-should-patch-netlogon-vulnerability | GossiTheDog |
2020-09-29 14:30:04 | TalosSecurity: We're tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, a… https://t.co/mLFSjzVb2k https://twitter.com/i/web/status/1310949603676770305 | southerncyber |
2020-09-29 14:10:04 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/CXa35GOyay https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | bebinjo |
2020-09-29 13:40:02 | Zerologon (CVE-2020-1472) | Demo: Explotación y prevención https://t.co/fhJ7KV5QVq #Zerologon #seguridadinformatica https://youtu.be/uabY1WZXQiM | lifydouglaspain |
2020-09-29 13:20:03 | We're tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an elevation of… https://t.co/HqdMJ51uGg https://twitter.com/i/web/status/1310930612551856130 | TalosSecurity |
2020-09-29 12:50:02 | Cisco Talos is tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an elev… https://t.co/jLAmlkvcMz https://twitter.com/i/web/status/1310924761866727424 | Cyber_O51NT |
2020-09-29 10:10:03 | The ZeroLogon Windows Flaw Vulnerability (CVE-2020-1472) See here the steps to protect yourselves:… https://t.co/HkRyFM8o30 https://twitter.com/i/web/status/1310884128280268801 | SysteComSA |
2020-09-29 09:10:05 | New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/ApkqMw9VKL https://lnkd.in/dnJPU5K | StefaniaIvanciu |
2020-09-29 08:30:03 | 20件のコメント https://t.co/v6cKXZ0ORy “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/YC8qa0Mpnq https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/n2fcL9133c | negima1976 |
2020-09-29 08:10:10 | "Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerabili… https://t.co/3ZIruGZZHz https://twitter.com/i/web/status/1310852523138281472 | sarvvid |
2020-09-29 08:10:04 | “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” (187 users) https://t.co/KMDYKFkHhs https://htn.to/2uKeeuc8Dy | Cujo3 |
2020-09-29 07:40:07 | CVE-2020-1472 Útočníci aktívne zneužívajú zraniteľnosť Windows serverov nazvanú „Zerologon“, odporúčame okamžitú ak… https://t.co/LuJVZe8vxE https://twitter.com/i/web/status/1310844745594343424 | CSIRT_SK |
2020-09-29 07:30:05 | New post: Cyberwatch – Recommandations sur la vulnérabilité CVE-2020-1472 (ZeroLogon) https://t.co/iODhBc7FlA https://reportcybercrime.com/cyberwatch-recommandations-sur-la-vulnerabilite-cve-2020-1472-zerologon/ | digitpol_cyber |
2020-09-29 07:20:04 | From @msftsecresponse We have updated the KB article for CVE-2020-1472 to provide clarity on customers actions to e… https://t.co/V5gPRujSeh https://twitter.com/i/web/status/1310840402392514567 | argevise |
2020-09-29 07:20:04 | From @msftsecresponse We have updated the KB article for CVE-2020-1472 to provide clarity on customers actions to e… https://t.co/7LQQ9GIo4x https://twitter.com/i/web/status/1310839910828511232 | argevise |
2020-09-29 07:00:05 | Cyberwatch - Recommandations sur la vulnérabilité CVE-2020-1472 (ZeroLogon) https://t.co/CNHGBdMqYZ https://bit.ly/2G9fVen | GS_Mag |
2020-09-29 07:00:04 | Is CVE-2020-1472 the new MS17-010?😊Are you here to stay CVE-2020-1472???🙃 | lorde_zw |
2020-09-29 06:00:07 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/OAfUmBuPCj https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | Tinolle1955 |
2020-09-29 05:40:05 | Windows Netlogon Elevation of Privilege Vulnerability CVE-2020-1472 https://t.co/PQLZAcHLUA https://securitynews.sonicwall.com/xmlpost/windows-netlogon-elevation-of-privilege-vulnerability-cve-2020-1472/ | BRChelmo |
2020-09-29 05:30:06 | Zerologon is the name that has been given to a vulnerability identified in CVE-2020-1472. It’s called zerologon due… https://t.co/kKmcBJPeqj https://twitter.com/i/web/status/1310813253639962627 | twit_krgz |
2020-09-29 05:30:05 | Über Microsoft Edge geteilt: Verwalten der Änderungen in den sicheren Netlogon Kanalverbindungen, die CVE-2020-1472… https://t.co/Zq5P6H8ZvL https://twitter.com/i/web/status/1310813536751423488 | rniedhorn |
2020-09-29 05:30:05 | Microsoft released a patch for CVE-2020-1472 (Zerologon). All AD servers (2008 R2 and above) should be patched as s… https://t.co/2cveFvcw34 https://twitter.com/i/web/status/1310813268353507328 | twit_krgz |
2020-09-29 04:10:04 | 最大級にヤバイ。 "本脆弱性は容易に悪用できる上に、悪用された場合の影響が非常に大きいことから、最優先で対策を実施いただくことを推奨します。" Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な… https://t.co/eJJSxfQ00e https://twitter.com/i/web/status/1310792348058542081 | maruyamatk |
2020-09-29 04:10:04 | これヤバいのでは。。。 ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/6zvM3celdh https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | maruyamatk |
2020-09-29 03:30:02 | A new CVE-2020-1472 Zerologon was released recently has made quite a few headlines. Join us live on Oct 1st at 11AM… https://t.co/L1p0h4XJ70 https://twitter.com/i/web/status/1310783808401223680 | TrendMicroANZ |
2020-09-29 03:20:09 | 【注意喚起】 Microsoft製品(Windows Server)の脆弱性について、IPAが 改めて 注意喚起をしています(CVE-2020-1472)。 攻撃が行われた場合の影響が大きいため、2020年8月の月例更新プログラム… https://t.co/3WKqPdJEdA https://twitter.com/i/web/status/1310780794537824256 | nisc_forecast |
2020-09-29 02:30:03 | A new CVE-2020-1472 Zerologon was released recently and made quite a few headlines. Join us live Oct 10th at 11AM A… https://t.co/XSeK5z29wO https://twitter.com/i/web/status/1310767490046324737 | TrendMicroANZ |
2020-09-29 02:10:04 | Zerologon(CVE-2020-1472)の悪用が確認されたとして、マイクロソフトや各国のセキュリティ機関が注意喚起しています。 更新プログラムは8月にリリースされていますが、ADサーバーともなると変更管理が厳重でタイムリー… https://t.co/2bcV2c70sx https://twitter.com/i/web/status/1310761996606791680 | ns_lsc |
2020-09-29 02:10:03 | Cibercriminales están explotando activamente exploits para la vulnerabilidad CVE-2020-1472 Netlogon EoP, apodada Ze… https://t.co/oEy6fm6Jgy https://twitter.com/i/web/status/1310762469888077826 | Mnemo_Colombia |
2020-09-29 02:00:06 | MSのパッチの件、動作がよくわからんなぁ CVE-2020-1472 監視はできる体制はとっているのだけど。 | papa_anniekey |
2020-09-29 01:00:02 | ALERTA DE SEGURIDAD: La explotación de la vulnerabilidad CVE-2020-1472, conocida como Zerologon, escala privilegio… https://t.co/3vVnOaLumK https://twitter.com/i/web/status/1310746112467243008 | _SecureSoft |
2020-09-29 00:50:02 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog #サイバー攻撃 #サイバーセキュリティ #ドメインコントロラ #Zerologon https://t.co/bbdBRbEB93 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | ntsbook |
2020-09-29 00:40:03 | Netlogonの脆弱性 CVE-2020-1472 必要となる対処(パッチの適用)に関するKB。寄せられているQAをアップデートしました。AD管理者の方はぜひご参照を https://t.co/3WFrDmuAhb https://support.microsoft.com/en-us/help/4557222 | EurekaBerry |
2020-09-29 00:30:03 | Zerologonの僕の動画を紹介してくれているQiitaの記事がありました! ありがとうございます! Zerologon (CVE-2020-1472) 「ドメインコントローラにパッチ適用を」 https://t.co/CAqRXZM9Sd #Qiita https://qiita.com/kodamap/items/436f7bc84a66b6267fee | fwarashi |
2020-09-29 00:30:02 | 脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 | トレンドマイクロ セキュリティブログ - https://t.co/VDWHAcosBS https://go.shr.lc/2Ghs94g | orange_hogehoge |
2020-09-29 00:20:04 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/erU9wlzuKS https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | se_kenchan |
2020-09-29 00:20:03 | IVが常に0とは...... ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/TSUVMn1f8A https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | diffshare |
2020-09-29 00:00:04 | @scanner303 @MSFT365Status Microsoft patched CVE-2020-1472 and is getting a reboot loop 😂 | MattFromTech |
2020-09-28 23:40:05 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/T82mhPspdP うひ https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | alicia_v_ff14 |
2020-09-28 23:40:04 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた piyolog https://t.co/8RDQWg4iy5 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | tic02_merc |
2020-09-28 23:30:04 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた 【piyolog】 https://t.co/dhvFyoqMmx https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | euramasahide |
2020-09-28 23:10:09 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/qPd7aGwi2t https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | Syynya |
2020-09-28 22:10:12 | Updateしましょう / 他15件のコメント https://t.co/nQ04HAFKV4 “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog… https://t.co/SGKwj4nKO0 https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://twitter.com/i/web/status/1310701894344474625 | ebi |
2020-09-28 21:50:20 | We have updated the KB article for CVE-2020-1472 to provide clarity on customers actions to ensure they are protect… https://t.co/VHNeJm0rhx https://twitter.com/i/web/status/1310696823275782144 | eyeTSystems |
2020-09-28 21:40:06 | #MSRC CVE-2020-1472 https://t.co/8omjTy7RUo https://twitter.com/msftsecresponse/status/1310686260126789634 | n_silva |
2020-09-28 21:10:35 | We have updated the KB article for CVE-2020-1472 to provide clarity on customers actions to ensure they are protect… https://t.co/WguEoHvWkD https://twitter.com/i/web/status/1310686260126789634 | msftsecresponse |
2020-09-28 21:00:22 | “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/qPJHZovS6X https://htn.to/3CcRy3FpGt | tmhwq |
2020-09-28 20:40:07 | “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/GYAEzM4aWL https://htn.to/2yi4AJmLGF | wasaist |
2020-09-28 19:20:04 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/I2NlOwsNn2 https://t.co/Csa4UNkKc6 http://newsbythehour.org/cybr http://bit.ly/3n01Lgu | everythingcybr |
2020-09-28 19:10:10 | A different way of abusing Zerologon (CVE-2020-1472) (via @_dirkjan) https://t.co/7NtN6182sX https://t.co/lSYgXof4Oe https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | ZeroLogon |
2020-09-28 19:10:05 | 15件のコメント https://t.co/rpmzNvhG5K “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” (142 users) https://t.co/uVMxUXOOJk https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/2SYwh1gWah | tkak |
2020-09-28 19:10:03 | Zerologon: instantly become Windows Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) : 10/10 CVSSv3… https://t.co/xv3EyLExcr https://twitter.com/i/web/status/1310657783134552064 | lcheylus |
2020-09-28 18:41:05 | 15件のコメント https://t.co/WNtciEI56e “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/B5jICpFkCR https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/6R7bZ6HE52 | mizchi |
2020-09-28 18:30:58 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-28 18:30:31 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog2020年8月に修正された脆弱性 CVE-2020-1472はドメインコントローラーが使用するNe… https://t.co/3KLoQdVLfW https://twitter.com/i/web/status/1310647009087496192 | yobata_tw |
2020-09-28 18:20:14 | Hackers Scanning for Unpatched Domain Controllers Vulnerable to CVE-2020-1472 https://t.co/JcfTFGTdmx https://www.itsecuritynews.info/hackers-scanning-for-unpatched-domain-controllers-vulnerable-to-cve-2020-1472/ | IT_securitynews |
2020-09-28 18:00:14 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/nsb8YlenTu #Zerologon https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | axcheron |
2020-09-28 18:00:08 | Take a moment to read this great article: Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/DAbo5WnADU http://dlvr.it/RhXGSj | infomgmttoday |
2020-09-28 16:10:05 | 400 hospitals across the US and UK, looks like #ryuk & #Zerologon CVE-2020-1472 #cyberthreats #patch… https://t.co/XUxNTUJIkd https://twitter.com/i/web/status/1310610848675659782 | zourick |
2020-09-28 15:40:09 | "Zer0dump is an #POC #exploit / #tool for abusing the #vulnerabilities associated with CVE-2020-1472 (Zerologon) in… https://t.co/R8E44RbT3L https://twitter.com/i/web/status/1310603819961606144 | levigundert |
2020-09-28 15:20:07 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/NnfR1bqyNn https://twitter.com/i/web/status/1310597883490598913 | deepwatch_sec |
2020-09-28 15:10:06 | 自宅のsambaも確認しとく。 / 他14件のコメント https://t.co/XgGb4lDxon “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piy… https://t.co/QHp43SD5QK https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://twitter.com/i/web/status/1310595375091253249 | mjtw |
2020-09-28 15:10:04 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/XR0iSqxsYN https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | upsetgo |
2020-09-28 14:59:02 | La #vulnérabilité CVE-2020-1472 surnommée #Zerologon permettant à un #pirate de prendre le contrôle d'un #domaine… https://t.co/siqCzmwi3E https://twitter.com/i/web/status/1310230920192983040 | PatriceLopez83 |
2020-09-28 14:50:06 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた https://t.co/YYX8PVTR8j https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | kirimemo |
2020-09-28 14:50:05 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/mKaFhYT5X4 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | sigeharucom |
2020-09-28 14:40:06 | New post from https://t.co/uXvPWJy6tj (CVE-2020-1472 (directory_server, fedora, leap, samba, ubuntu_linux, windows_… https://t.co/5rOIZ85mfZ http://www.sesin.at https://twitter.com/i/web/status/1310588846707478528 | WolfgangSesin |
2020-09-28 14:40:04 | はあああああ!? / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/EufrezGox6 https://htn.to/Wf2ziNhWWR | glassofleng |
2020-09-28 14:30:04 | piyokango さんの説明 / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/nhfw8TukWg https://htn.to/3Rmsyu9ooQ | modokey |
2020-09-28 14:10:03 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog "ネットワーク内に攻撃者により侵害された端末が存在する場合、ドメイン管理者の権限が取得される恐… https://t.co/7RszRlMASR https://twitter.com/i/web/status/1310582534158209028 | moneymog |
2020-09-28 14:10:03 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/7rsz7oVh2m https://twitter.com/i/web/status/1310582469989740546 | camillacurrin |
2020-09-28 13:20:13 | @ZephrFish is it me or anyone else struggling to get clear text traffic for CVE-2020-1472 PoC that shows microsoft… https://t.co/901djVHK4A https://twitter.com/i/web/status/1310568091969941504 | pwn_the_world |
2020-09-28 13:20:07 | げんなり / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/VsdKgSe4aw https://htn.to/3BVxCp6So9 | launcher_test |
2020-09-28 13:10:08 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/13kK3pWwVL https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | topic_tw |
2020-09-28 13:00:40 | Comment identifier et neutraliser la vulnérabilité CVE-2020-1472 / ZeroLogon ? #cybersécurité #infosec #netlogon https://t.co/IToT63Bw5G https://cyberwatch.fr/actualites/comment-identifier-et-neutraliser-la-vulnerabilite-cve-2020-1472-zerologon-netlogon/ | cyberwatch |
2020-09-28 13:00:19 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog (83 users) https://t.co/O40bryKbur : https://t.co/7K5Stxl39I https://bit.ly/3kUB0YV https://bit.ly/30f0gRT | hatebu_eandb |
2020-09-28 13:00:14 | 【はてブ】 ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/rePhBXE2Yt http://dlvr.it/RhWGwq | news_sokuhou |
2020-09-28 12:50:31 | ドメインコントローラーの脆弱性放置はヤバい / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/gs8KJKSlKE https://htn.to/GM3FH5YAsr | igaos |
2020-09-28 12:50:08 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/hFVVENWukU https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | hatena_bookmark |
2020-09-28 12:20:06 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/l9OuB4DDWe https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | Hk0910Sec |
2020-09-28 12:00:06 | 8件のコメント https://t.co/EhK4x4DLde “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” (72 users) https://t.co/KsSxb0SOM5 https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/6rnMPHs2Aa | RyoTa63292153 |
2020-09-28 11:50:10 | Microsoft engineers warn - hackers have exploited Zerologon issue (CVE-2020-1472) #Zanket #Zerologon #CVE #vulnerability #CyberSecurity | Zanket_com |
2020-09-28 11:50:05 | 8件のコメント https://t.co/p4bbanOcGy “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/QKckvJZlyS https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/Qk4t1yBk8C | minamijoyo |
2020-09-28 11:40:06 | “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/WhgHnfY7pX #web https://htn.to/415HjtYXSQ | yujiorama |
2020-09-28 11:30:18 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog - https://t.co/pmcsmytTmE https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | uwabami |
2020-09-28 10:50:08 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/NrWoA6YJBY https://twitter.com/i/web/status/1310531152311132162 | polo_nmh |
2020-09-28 10:40:06 | 7件のコメント https://t.co/KSAIzZRlBG “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/ALK7p17Iqd https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/22TNX7jt9B | napsucks |
2020-09-28 10:40:04 | ひでえ / 他7件のコメント https://t.co/KSAIzZRlBG “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/ALK7p17Iqd https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/22TNX7jt9B | napsucks |
2020-09-28 10:30:04 | IVが固定であってもゼロじゃなければもっとましだったが、ゼロなだけで驚くほど脆弱になる。 / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/h9PMI7FrYS https://htn.to/TVAjGKyDgP | rryu2010 |
2020-09-28 10:20:06 | Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/1PrjiwSMyA @jpcert https://www.jpcert.or.jp/newsflash/2020091601.html | kai_ri_0001 |
2020-09-28 09:40:03 | “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/StkyCp0GAk https://htn.to/2BBWYyUX2f | nopira |
2020-09-28 09:30:05 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/1yjoCMGzTL https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | t_erenoa |
2020-09-28 09:30:03 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/kHJJJ2cfRj http://dlvr.it/RhVdJs | hatebusecurity |
2020-09-28 09:10:10 | [B! セキュリティ] ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/P0sN2TZU9w https://b.hatena.ne.jp/entry/s/piyolog.hatenadiary.jp/entry/2020/09/28/124522 | boss2k |
2020-09-28 09:00:49 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/NOuT5dKOt7 #security https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | G76whizkidz |
2020-09-28 08:40:14 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/65BPqjh3i1 https://ift.tt/2S3UpKx | nerubesa |
2020-09-28 08:40:07 | IVヌルクリアとか久しぶりに初歩的なのきたな / 他5件のコメント https://t.co/4FFc299DNJ “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた… https://t.co/0eGkxHHHl8 https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://twitter.com/i/web/status/1310498900059414528 | eru016 |
2020-09-28 08:10:35 | Apelidada de “Zerologon”, a brecha especificada como CVE-2020-1472 é um bug crítico de elevação de privilégio que a… https://t.co/DKkZPFi2PJ https://twitter.com/i/web/status/1310490455050727424 | PhishX |
2020-09-28 08:10:29 | “Recomendamos fortemente que os clientes apliquem imediatamente as atualizações de segurança para CVE-2020-1472. Os… https://t.co/PT4nMo8yob https://twitter.com/i/web/status/1310490457055559682 | PhishX |
2020-09-28 08:00:35 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 < in case you haven’… https://t.co/QiSv7PvvWa https://twitter.com/i/web/status/1310488028603805697 | ateixei |
2020-09-28 08:00:25 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/ALUubvJJS0 https://ift.tt/2S3UpKx | magiauk |
2020-09-28 07:50:07 | これ、結構ヤバい気が。 / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/9gUnRGwtVn https://htn.to/43Bc7HZv2b | ch1248 |
2020-09-28 07:20:40 | #Detecting and Preventing Exploitation of Critical ZeroLogon Windows Server Vulnerability (CVE-2020-1472)… https://t.co/uBwm265aDk https://twitter.com/i/web/status/1310476976835174403 | sirajs0l |
2020-09-28 07:20:15 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog - https://t.co/2tMHxDm848 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | orenoshio |
2020-09-28 07:20:06 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた https://t.co/ALUubvJJS0 https://ift.tt/2S3UpKx | magiauk |
2020-09-28 06:40:05 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/SuQJN080zC Windows Server、Sambaが影響を受ける https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | Stocker_jp |
2020-09-28 06:20:18 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/rTkI2pVZ6C https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | it_hatebu |
2020-09-28 05:50:12 | この辺が痛い…『Zerologonに対応したMimikatzが公開された』:ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/fU8dFp2aPB https://itnews.org/news_resources/221155 | tamosan |
2020-09-28 05:30:13 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/pxOu3vHZbc https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | tethys_seesaa |
2020-09-28 05:20:15 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/VAbANIcw7a ”9月11日に技術情報と実証コードが公開され、… https://t.co/63yqfCyfer https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 https://twitter.com/i/web/status/1310447949629984768 | catnap707 |
2020-09-28 05:20:10 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/yQoRwWKmSv https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | _su_dev |
2020-09-28 05:20:09 | “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/5PDnIzDY1X https://htn.to/ufUURyvkud | yuumediatown |
2020-09-28 05:20:07 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/SwaGT0fkKB https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | ragemax |
2020-09-28 05:10:14 | 本件悪用始まっている模様。入られてからのインパクトが大きいので要対処。 / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/yVPuuI4n9i https://htn.to/38vdYiPS1k | tetsutalow |
2020-09-28 05:00:07 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/cmbZoBhSqw https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | taku888infinity |
2020-09-28 04:10:09 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/5P4XrTtVhb https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | ohhara_shiojiri |
2020-09-28 04:00:27 | ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/cuIvPXNLvS https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | Horita_JAIC |
2020-09-28 03:50:32 | はてなブログに投稿しました #はてなブログ ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/RYwDaMzcBs https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 | piyokango |
2020-09-28 02:20:06 | CVE-2020-1472 これ当てて問題出た事例ない? | maccha1030 |
2020-09-27 22:20:03 | Microsoft, Windows Server ailesinde bulunan Zerologon (CVE-2020-1472) zafiyetinin, hackerlar tarafından sömürülmeye… https://t.co/McVx42LGHp https://twitter.com/i/web/status/1310341101597982720 | hackpressorg |
2020-09-27 22:00:06 | A different way of abusing Zerologon (CVE-2020-1472) (via @_dirkjan) https://t.co/acwd7LJpCR https://t.co/6xBgzTBnkW https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | campuscodi |
2020-09-27 18:30:37 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-27 16:10:08 | A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/YaoHFJogn7 https://twitter.com/i/web/status/1310247901575229440 | Kasperskybrasil |
2020-09-27 15:10:09 | 脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 - https://t.co/IXV8ssfpnL https://go.shr.lc/2Ghs94g | Hk0910Sec |
2020-09-27 13:22:20 | 【ドメインコントローラーを脅かす脆弱性「Zerologon」】 ・CVE-2020-1472 →クライアントコンピューターになりすましてドメインコントローラー(ネットワーク全体を制御しADを実行するサーバー)のパスワードを変更、ド… https://t.co/vk2oKPGjy0 https://twitter.com/i/web/status/1310205673569792001 | HAL_CSIRT |
2020-09-27 11:10:17 | #Samba addresses the CVE-2020-1472 #Zerologon Vulnerability https://t.co/U9LaYU8r79 #securityaffairs #hacking #linux https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html | securityaffairs |
2020-09-27 09:40:07 | C'est reparti ... #CVE-2020-1472 https://t.co/7XgDBdJxgi https://twitter.com/MsftSecIntel/status/1308941504707063808 | thierrym |
2020-09-27 08:30:09 | “脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 | トレンドマイクロ セキュリティブログ” https://t.co/MZv2THPBHQ https://htn.to/2u5VScYRTz | labunix |
2020-09-27 07:30:09 | The @Zerologon attack is based on the exploitation of the privilege escalation #vulnerability, CVE-2020-1472, which… https://t.co/yEo5uLGiZh https://twitter.com/i/web/status/1310119328079966208 | hackxsecurity |
2020-09-27 07:20:32 | #Detecting and Preventing Exploitation of Critical ZeroLogon Windows Server Vulnerability (CVE-2020-1472)… https://t.co/hKTY4y8wlL https://twitter.com/i/web/status/1310114796059217920 | sirajs0l |
2020-09-27 06:50:09 | From CERT: Samba Releases Security Update for CVE-2020-1472 #jokes | iniaes |
2020-09-27 05:50:11 | 脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 | トレンドマイクロ セキュリティブログ https://t.co/6f6VFzrWJi https://blog.trendmicro.co.jp/archives/26206 | ohhara_shiojiri |
2020-09-27 04:50:15 | CVE-2020-1472, or #Zerologon, is a great example of the value of virtual patching featured in our products.… https://t.co/lPpvpOsZWt https://twitter.com/i/web/status/1310077203149983744 | trendmicro_mea |
2020-09-27 03:20:06 | 脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 - https://t.co/Qt9gXOKWJL https://blog.trendmicro.co.jp/archives/26206 | ka0com |
2020-09-27 03:20:04 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/cA6KJEl4mY https://twitter.com/i/web/status/1310056550799749120 | trendmicro_john |
2020-09-27 01:00:06 | “脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 | トレンドマイクロ セキュリティブログ” (2 users) https://t.co/mgX9nohJZY https://htn.to/kUEA69NX7h | matsuu_zatsu |
2020-09-27 00:50:04 | From our content community: CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Wi… https://t.co/h8xzYYPtaW https://twitter.com/i/web/status/1310016324731416576 | CTOUniverse |
2020-09-26 23:50:06 | 脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 - トレンドマイクロ セキュリティブログ https://t.co/Su781N0Boz https://go.shr.lc/2Ghs94g | spread_jp |
2020-09-26 22:20:06 | #Netlogon EoP vulnerability (CVE-2020-1472) can be exploited in matter of seconds. Security issue impacts Windows S… https://t.co/AM4z8aYCis https://twitter.com/i/web/status/1309979968374534144 | edgytimes |
2020-09-26 20:50:03 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/CPVsDkdWwI https://twitter.com/i/web/status/1309957936513458177 | deepwatch_sec |
2020-09-26 20:20:04 | 脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 https://t.co/gmDQvi1YLK https://t.co/NySeaPRKKx https://blog.trendmicro.co.jp/archives/26206 | Panda_Lv0 |
2020-09-26 19:50:03 | 脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 https://t.co/8V35vKySJe #TrendMicro https://ift.tt/3jcNAm0 | G3fu1 |
2020-09-26 18:30:10 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-26 17:50:05 | If you haven't patched your AD Domain Controllers for CVE-2020-1472 - you are running out of time https://t.co/Qz25xPlJL9 https://twitter.com/gossithedog/status/1309901911869587463 | aprilmardock |
2020-09-26 17:10:04 | I have detected in the wild exploitation of CVE-2020-1472, aka ZeroLogon, in my honeypot. This is an escalation in… https://t.co/7QK9EE4Ec9 https://twitter.com/i/web/status/1309901911869587463 | GossiTheDog |
2020-09-26 16:30:07 | okay, the honeypot has detected in the wild, spray and pray exploitation of CVE-2020-1472 over the internet. blog coming up. | GossiTheDog |
2020-09-26 16:14:43 | CVE-2020-1472 interfacing with your domain controller https://t.co/9cHeWpIgzx https://twitter.com/ddoniolvalcroze/status/1309523983260237824 | dirtywhitehat |
2020-09-26 14:10:04 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/RiQhOTTAVH https://blog.zsec.uk/zerologon-attacking-defending/ | AlexaChenowith |
2020-09-26 08:20:03 | 🔴MICROSOFT🔴 Múltiples vulnerabilidades de severidad alta en productos MICROSOFT: CVE-2020-1597,CVE-2020-1472 Más… https://t.co/19qVeKovIM https://twitter.com/i/web/status/1309769639707242496 | GrupoICA_Ciber |
2020-09-26 07:40:08 | Great artical about diffrent way to do attacks with Zerologon (CVE-2020-1472) #hack #redteam #cve #hackers https://t.co/dC3BFbkOzi https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | RogerBergling |
2020-09-26 07:00:04 | New post: Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 – Kashif Ali https://t.co/RjpSFEunJc https://reportcybercrime.com/unpatched-domain-controllers-remain-vulnerable-to-netlogon-vulnerability-cve-2020-1472-kashif-ali/ | digitpol_cyber |
2020-09-26 00:20:02 | Due to the severe nature of CVE-2020-1472, @CrowdStrike has developed a custom Zerologon dashboard to determine if… https://t.co/oPxfL7kQ0S https://twitter.com/i/web/status/1309646756049813505 | skovsky |
2020-09-25 23:50:02 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/Y8OpMm86yw https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | ch3tanK |
2020-09-25 23:40:03 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/C3Jzit5w1U https://blog.zsec.uk/zerologon-attacking-defending/ | ch3tanK |
2020-09-25 22:10:07 | A different way of abusing Zerologon (#CVE-2020-1472) https://t.co/RUkkR1d283 https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | WilfridBlanc |
2020-09-25 22:10:05 | Microsoft warns of active exploits in the wild of Zerologon vulnerability CVE-2020-1472 (update)… https://t.co/LsDI7mlCOr https://twitter.com/i/web/status/1309613797976559619 | securezoo |
2020-09-25 22:00:13 | 「Netlogon Remoteプロトコル(MS-NRPC)」の実装において、別名「Zerologon」と呼ばれる脆弱性「CVE-2020-1472」が明らかとなった問題で、脆弱性の悪用が確認。米政府やマイクロソフトでは悪用を確認… https://t.co/YQOiYR7meX https://twitter.com/i/web/status/1309612274185916421 | ismsecuritynews |
2020-09-25 21:40:06 | A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/0UJ4jtmLQ5 https://t.co/tYqSnRBhb3 http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | UnctusM |
2020-09-25 21:40:05 | Mimikatz CVE-2020-1472 Zerologon rule for Snort/Suricata https://t.co/Z5ZwIa0YQA #cyber #threathunting #infosec https://t.co/go5oGq2udK http://dlvr.it/RhMgqZ | blueteamsec1 |
2020-09-25 20:50:03 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/sBxQ5CESVO #uscert #gov https://buff.ly/3ct4ERT | NotTruppi |
2020-09-25 18:30:07 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-25 18:10:04 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 #Anonymous https://t.co/7I2J837KpM https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | AnonAnonymous |
2020-09-25 17:50:15 | Microsoft released security patches for vulnerability CVE-2020-1472, also dubbed “Zerologon,” to be deployed on AD,… https://t.co/B8WhXUxfoK https://twitter.com/i/web/status/1309543806715547655 | SankalpITteam |
2020-09-25 17:30:07 | Microsoft released security patches for vulnerability CVE-2020-1472, also dubbed “Zerologon,” to be deployed on AD,… https://t.co/F81gXCFDC7 https://twitter.com/i/web/status/1309543649626202114 | prag95750323 |
2020-09-25 17:30:03 | #CVE-2020-1472 #ZeroLogon Alert: ‘Critical’ Windows Vulnerability Needs Your Attention. The @Keysight_ATI team put… https://t.co/s44FzGhk5m https://twitter.com/i/web/status/1309545703014834182 | IXIAcom |
2020-09-25 17:20:05 | A different way of abusing #Zerologon (CVE-2020-1472) https://t.co/GjWEOqrisS https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | domineefh |
2020-09-25 17:10:07 | A different way of abusing Zerologon (CVE-2020-1472): https://t.co/CSqdVYBSgQ #zerologon #cve #security https://t.co/iwVtpwLjbZ https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | blackstormsecbr |
2020-09-25 17:10:06 | If you are worried about CVE-2020-1472, here is the link to Microsoft NetLogon recommendations https://t.co/HWC1D1BCWB https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | santosomar |
2020-09-25 16:50:09 | CVE-2020-1472 https://t.co/XeSPgcLm43 https://www.zdnet.com/article/microsoft-says-it-detected-active-attacks-leveraging-zerologon-vulnerability/ | CVEannounce |
2020-09-25 16:10:04 | Se dio a conocer la explotación de la vulnerabilidad CVE-2020-1472, #Zerologon. Esta escala privilegios debido al u… https://t.co/wkIBcml1ef https://twitter.com/i/web/status/1309524376455446536 | EcuCERT_EC |
2020-09-25 15:50:10 | As @gcluley astutely writes: If your business runs Windows Server, patch the Zerologon vuln - CVE-2020-1472.… https://t.co/FqyUkg5K6i https://twitter.com/i/web/status/1309518850354970625 | benrothke |
2020-09-25 15:30:04 | Learn more about Zerologon, CVE-2020-1472. https://t.co/TrD07b2aia https://t.co/hSvnNgdACE http://ow.ly/xdNr50BBllz https://www.nopsec.com/just-in-time-bulletin-zerologon/ | nopsec |
2020-09-25 15:10:05 | A different way of abusing #ZeroLogon (CVE-2020-1472) Using the Printer Bug with zerologon to relay to DSRUAPI and… https://t.co/Ahgat2ZRzz https://twitter.com/i/web/status/1309507973950181376 | GroupHackathon |
2020-09-25 14:50:16 | "A different way of abusing Zerologon (CVE-2020-1472)" https://t.co/X1iuOP7Sqp https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | andy_one |
2020-09-25 14:50:04 | A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/83ZpGExHU7 https://t.co/uxPhZ9gVHx http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | n0ipr0cs |
2020-09-25 14:30:06 | マイクロソフトはCVE-2020-1472 vulnerability, aka ZeroLogonに対する攻撃を確認。認証回避と権限昇格が可能でdomainのadministrator権限の取得が可能。今直ぐパッチを当てろ! https://t.co/st95bCLCnl https://twitter.com/TheRegister/status/1309260763375296513 | jingbay |
2020-09-25 14:10:05 | Aktuelles zur Zerologon-Sicherheitslücke (CVE-2020-1472) https://t.co/TSKZMh3SPh https://cert.at/de/aktuelles/2020/9/neues-zur-zerologon-sicherheitslucke-cve-2020-1472 | CERT_at |
2020-09-25 14:10:03 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/e7fy5GTGMQ https://twitter.com/i/web/status/1309494819744632833 | TrendMicroUK |
2020-09-25 14:00:06 | What is #zerologon - find out at #trendmicro #vulnerabilities #cybersecurity #infosec MS-NRPC CVE-2020-1472 https://t.co/5s3wuoXr9A https://lnkd.in/dB2JPQX | vesajoki |
2020-09-25 14:00:03 | Zerologon (CVE-2020-1472) privilege elevation vulnerability is actively being exploited. Patch your Windows boxes. | Pfirstbrook |
2020-09-25 13:30:05 | "بهروزرسانی SAMBA و رفع آسیبپذیری CVE-2020-1472" https://t.co/mwVizeUt3a https://ift.tt/2S0rqaA | ICTna |
2020-09-25 13:30:03 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/Ph4j2aJPME https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogon | SecureNetIT |
2020-09-25 12:50:05 | New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/SldmM67jIs https://lnkd.in/dxtmYhV | ggclass |
2020-09-25 12:40:06 | #Security readings: A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/XFAT1baKCd… https://t.co/WNfFwk9NlE http://dirkjanm.io https://twitter.com/i/web/status/1309471115954315264 | LinuxSec |
2020-09-25 12:10:04 | A different way of abusing Zerologon (CVE-2020-1472) – https://t.co/CiBqd3cuSw https://t.co/jgFv7FUsxL http://dirkjanm.io https://aeternusmalus.wordpress.com/2020/09/25/a-different-way-of-abusing-zerologon-cve-2020-1472-dirkjanm-io/ | DoggoJoshu |
2020-09-25 12:00:07 | Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerabilit… https://t.co/Pw5aeLXNFF https://twitter.com/i/web/status/1309460678995050496 | FAllendesF |
2020-09-25 12:00:05 | In August, @Microsoft released #security patches for a critical vulnerability CVE-2020-1472, also dubbed “… https://t.co/EKy6ydAJmE https://twitter.com/i/web/status/1309461401380040704 | KaseyaCorp |
2020-09-25 11:20:06 | New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/Q4JaChPSdZ https://lnkd.in/ggt3Mif | SrinivasR2013 |
2020-09-25 11:10:06 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/rjfDc4OZ4V https://blog.zsec.uk/zerologon-attacking-defending/ | samilaiho |
2020-09-25 10:20:04 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/ElkyfFZYGx https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | Dinosn |
2020-09-25 10:20:04 | CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/TJL9SOQukU via @YouTube 面白かったです、勉強になりました! 動画でも言われてるけど、めっちゃCTFで出そうな脆弱性だな https://youtu.be/1h_wlMWwyB4 | 00000a24 |
2020-09-25 10:10:08 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/N5lN6iUskT https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | AlexaChenowith |
2020-09-25 10:00:04 | "A different way of abusing Zerologon (CVE-2020-1472)" https://t.co/vSVMxnV4uw https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | _hg8_ |
2020-09-25 09:10:08 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/tMMpSXPs98 https://blog.zsec.uk/zerologon-attacking-defending/ | I_am_cjc |
2020-09-25 09:10:08 | A different way of abusing #Zerologon (CVE-2020-1472) https://t.co/gMDDBKE7Sc https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | Anastasis_King |
2020-09-25 08:30:06 | so microsoft still not update their page Security Update Guide > Details CVE-2020-1472 | Netlogon Elevation of Priv… https://t.co/sh7Pg5ufmE https://twitter.com/i/web/status/1309407326265171969 | snowdarkz |
2020-09-25 08:30:05 | Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/1D2sNtqqLQ @jpcert ”マイクロソフト (Microsoft Security Intellige… https://t.co/PyI5wODcSZ https://www.jpcert.or.jp/newsflash/2020091601.html https://twitter.com/i/web/status/1309408467434704896 | catnap707 |
2020-09-25 08:20:06 | A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/U4AP1y43iO https://t.co/jefWcYlK0B http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | ohhara_shiojiri |
2020-09-25 08:20:04 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/r0rzvLW4V3 https://twitter.com/i/web/status/1309406761749708801 | jkrogsboll |
2020-09-25 08:00:03 | Microsoft says it detected active attacks leveraging Zerologon vulnerability (CVE-2020-1472) via @ZDNet #Proficio… https://t.co/xi0RPgCeGF https://twitter.com/i/web/status/1309402260691009538 | proficioinc |
2020-09-25 07:50:04 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/AzwrsNayYl https://blog.zsec.uk/zerologon-attacking-defending/ | Dan_Suciu |
2020-09-25 07:30:05 | ⚠️ #PATCH ⚠️ Les CERT français & allemand ont tous deux republiés l’URGENCE de corriger la faille CVE-2020-1472… https://t.co/cnuL8AwmxC https://twitter.com/i/web/status/1309392390600491011 | FabianRODES |
2020-09-25 07:10:06 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 Original release date: Sept… https://t.co/Fyq3q5bYWB https://twitter.com/i/web/status/1309387736009314304 | threatmeter |
2020-09-25 07:10:04 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/URPFf5FiWY https://ift.tt/340kaRH | cyberbuzznews |
2020-09-25 06:40:07 | Microsoft Lacak Aktor Dibalik Zerologon CVE-2020-1472 https://t.co/tgIwAZeUjK https://www.nesabamedia.com/microsoft-lacak-aktor-dibalik-zerologon-cve-2020-1472/ | BlogNesabaMedia |
2020-09-25 06:20:06 | IT Notfalleinsatz seit gestern 19:30 mit 1 Stunde Schlaf Unterbrechung. Danke M$ für CVE-2020-1472 🤬🖕 | rasgultam |
2020-09-25 06:10:17 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/KEbYYELUxs… https://t.co/SJ6nRvvTLf https://bit.ly/36iWZVx https://twitter.com/i/web/status/1309372353072304128 | cyberdian_cert |
2020-09-25 06:00:06 | Top story: A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/bAS0MuEN03 https://t.co/D3m0yG7DBX,… https://t.co/YVkcWLydWN http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ https://twitter.com/i/web/status/1309371928394764288 | r45c4l |
2020-09-25 06:00:05 | If you have not patched CVE-2020-1472 (#Zerologon) yet, do it NOW! #InfoSec https://t.co/9qQ60tRTWF https://twitter.com/MsftSecIntel/status/1308941504707063808 | sattlert |
2020-09-25 05:50:05 | 更新: 2020年9月25日 > Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/dcCxZJkP6i https://www.jpcert.or.jp/newsflash/2020091601.html | ohhara_shiojiri |
2020-09-25 05:50:05 | A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/3mCvxXqdU5 https://t.co/DCOsXl67mn http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | PVynckier |
2020-09-25 05:20:06 | CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」を更新。本脆弱性を悪用した攻撃が確認されています。マイクロソフトが提供する情報を参考に、早急に対策の実施をご検… https://t.co/eyt6lyWrmV https://twitter.com/i/web/status/1309360695247421440 | jpcert |
2020-09-25 04:50:23 | A different way of abusing Zerologon, tracked as CVE-2020-1472. This is an authentication bypass vulnerability in t… https://t.co/QpsfFThzTf https://twitter.com/i/web/status/1309351626994593792 | kot_hacker |
2020-09-25 04:00:05 | すみません...今更CVE-2020-1472(zerologon)について知りました...グヘェ | t0kapo |
2020-09-25 03:30:04 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/W4edRPWFHL https://bit.ly/3mSDcC7 | kuhn_on_kash |
2020-09-25 03:20:04 | CISAが、Netlogon脆弱性 CVE-2020-1472についてのきじをりりーすした。 その中で、パッチが適用されていないドメインコントローラを検出する パッチ検証スクリプト をリリースした起債がある。 念のため、検証スク… https://t.co/9rdqPYOVSt https://twitter.com/i/web/status/1309331488547069953 | hogehuga |
2020-09-25 03:20:04 | CVE-2020-1472 earned #Microsoft’s most-dire “critical” severity rating, meaning attackers can exploit it with littl… https://t.co/WlQPlLAhT9 https://twitter.com/i/web/status/1309330543692197896 | cjkonrad |
2020-09-25 02:50:04 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/zMnwQ1RnXJ https://j.mp/3kRb9kJ | PatrickCMiller |
2020-09-25 02:30:04 | #Microsoft sounds alarm over active attacks using exploits for the CVE-2020-1472 #Netlogon #EoP vulnerability, dubb… https://t.co/P1kFgWl4mh https://twitter.com/i/web/status/1309318044100046855 | dpvora |
2020-09-25 02:00:04 | Microsoft Says Hackers Actively Targeting Zerologon Vulnerability (CVE-2020-1472) https://t.co/GctAksglnE https://www.securityweek.com/microsoft-says-hackers-actively-targeting-zerologon-vulnerability | SecurityWeek |
2020-09-25 01:00:08 | A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/2uvdkmodaN - https://t.co/ambQXCeP8o http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | moton |
2020-09-25 00:40:06 | https://t.co/Fd11rq48vW A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/28VjlQsmia https://dirkjanm.io/a-different-way-of-abusing-zerologon/ http://dirkjanm.io | 1nf0s3cpt |
2020-09-25 00:40:05 | #Cybersecurity #InfoSec A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/9UVEMTNyfR… https://t.co/bQ6mKO6uHL http://dirkjanm.io https://twitter.com/i/web/status/1309289673865547777 | SritaKaren |
2020-09-25 00:30:05 | Top story: A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/GCmXcXOVeq https://t.co/imtuHI7c72,… https://t.co/c3u75ODflU http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ https://twitter.com/i/web/status/1309286597804920832 | DLsec101 |
2020-09-24 23:50:13 | A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/azYthNk07h https://t.co/q8VQI1Jbwo http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | tais9 |
2020-09-24 23:50:13 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/XKqGAGXigB #appsec #security #secops https://ift.tt/3mLFhzL | rtcz_io |
2020-09-24 23:40:10 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/99wkFjR7TN http://hrbt.us/213436 | hardreboot |
2020-09-24 23:30:04 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 - https://t.co/ybW83hbewX https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogon | moton |
2020-09-24 23:20:05 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 - https://t.co/O5YnH1ZSx9 https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogon | ka0com |
2020-09-24 23:00:07 | New post: "A different way of abusing Zerologon (CVE-2020-1472)" https://t.co/PDtkHpSaYl https://ift.tt/33XQZyl | Myinfosecfeed |
2020-09-24 22:30:04 | A different way of abusing Zerologon (CVE-2020-1472) #netsec #security #tech #cybersecurity https://t.co/zv2VTQKI11 https://ift.tt/3mLFhzL | _drewlong |
2020-09-24 22:20:07 | A different way of abusing Zerologon (CVE-2020-1472) https://t.co/O4y9wsch0o https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | _r_netsec |
2020-09-24 22:10:14 | ZeroLogon(#CVE-2020-1472) - Attacking & Defending https://t.co/ofLjBSBrQb https://blog.zsec.uk/zerologon-attacking-defending/ | WilfridBlanc |
2020-09-24 22:10:13 | Check out the latest news as of Sep 25 featuring “A different way of abusing Zerologon (CVE-2020-1472)” https://t.co/seLZ3TFzcX https://nzzl.us/NT0UkRV | NewsinIT |
2020-09-24 22:10:06 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/RJW0oCEw9b https://twitter.com/i/web/status/1309253065783025664 | HiddenMaces |
2020-09-24 21:40:05 | You’re Going to Want to Patch CVE-2020-1472 (Zerologon) ASAP: CVE-2020-1472, aka “Zerologon,” is making the news th… https://t.co/ySLOvJRiku https://twitter.com/i/web/status/1309244611445964800 | cipherstorm |
2020-09-24 21:40:04 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/KA8iKwsb1O https://blog.zsec.uk/zerologon-attacking-defending/ | n0ipr0cs |
2020-09-24 21:40:03 | A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/NDbM4PKgNX https://t.co/VWwRlVEsMG http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ | opexxx |
2020-09-24 21:20:08 | Zerologon : Microsoft signale des attaques https://t.co/xGpYH0TwDx via @zdnetfr CVE-2020-1472 https://www.zdnet.fr/actualites/zerologon-microsoft-signale-des-attaques-39910177.htm | argevise |
2020-09-24 21:20:04 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/4H3o9wtZO5 http://dlvr.it/RhHvpC | amolsarwate |
2020-09-24 21:10:09 | El CVE-2020-1472 de vulnerabilidad crítica apodado Zerologon, podría permitir a los atacantes remotos establecer un… https://t.co/GnKmrUcwdg https://twitter.com/i/web/status/1309237445444218880 | BackTrackAcadem |
2020-09-24 21:00:08 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/DqoV2YQ6CF https://twitter.com/i/web/status/1309234679233609728 | radiceu |
2020-09-24 21:00:07 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/5Fxm4DQflS https://twitter.com/i/web/status/1309234775316746242 | deepwatch_sec |
2020-09-24 20:40:05 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon,may allow an attack… https://t.co/xkvUeFpXlr https://twitter.com/i/web/status/1309228960337846283 | TracyShouldice |
2020-09-24 20:30:03 | It is pretty humbling 🙇♂️and awesome 👏 to see our teams work 🛡on Zerologon (CVE-2020-1472) mentioned in the latest… https://t.co/hG4NoHU0q0 https://twitter.com/i/web/status/1309228461651787776 | d1vious |
2020-09-24 20:10:03 | So, for the CVE-2020-1472 vulnerability (Netlogon), I ran the CMPivot Query : Registry('hklm:\\SYSTEM\\CurrentContr… https://t.co/SsKMbAanpE https://twitter.com/i/web/status/1309223176195510287 | SCCM_Ryan |
2020-09-24 20:00:11 | Active exploitation of CVE-2020-1472, an elevation of privilege vulnerability in Microsoft’s Netlogon. A remote att… https://t.co/aShwnRDFGg https://twitter.com/i/web/status/1309218576427970560 | IanBarwise |
2020-09-24 20:00:06 | Microsoft Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472 - Update 1https://cyber.gc.ca/en/alerts/mic… https://t.co/OJZtAFDFhU https://twitter.com/i/web/status/1309220237166997504 | threatmeter |
2020-09-24 19:40:09 | Some examples of mitigation techniques for #ZeroLogon Vulnerabiliy and A handy walkthrough of CVE-2020-1472 from bo… https://t.co/IHQJpuD3AI https://twitter.com/i/web/status/1309212892193943553 | CVEandABV |
2020-09-24 19:40:06 | Love how quick people are finding these exploits and CVE'ing them away... CVE-2020-1472 https://t.co/5neh0cJcBR https://twitter.com/_dirkjan/status/1309214379003588608 | OuttingLiars |
2020-09-24 19:30:06 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 | CISA https://t.co/nqrLDSdCVD https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogon | RRalstonAgile |
2020-09-24 19:30:05 | ZeroLogon (CVE-2020-1472) testing script https://t.co/hil1oq2NSq https://github.com/SecuraBV/CVE-2020-1472 | 3m1l |
2020-09-24 19:30:04 | Zerologon (CVE-2020-1472) | Vulnerabilidad de elevación de privilegios e... https://t.co/yzTh4Nwcud a través de @YouTube https://youtu.be/KKs5kCLbJjA | Mifmtz |
2020-09-24 19:20:10 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/I2NlOwsNn2 https://t.co/fZuhrsteHg http://newsbythehour.org/cybr http://bit.ly/33XhpAe | everythingcybr |
2020-09-24 19:20:08 | [MàJ du 24/09/ 2020] CVE-2020-1472 Microsoft confirme l'exploitation de cette vulnérabilité par des attaquants.… https://t.co/0ofkKcv1Ne https://twitter.com/i/web/status/1309208922016952321 | argevise |
2020-09-24 19:20:07 | #ITSecurity : ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/jdruBZfHqY https://blog.zsec.uk/zerologon-attacking-defending/ | GAILLOTPatrice |
2020-09-24 19:20:05 | شرح اكتشاف ثغرة CVE-2020-1472 من خلال استخدام splunk https://t.co/kZk2ruDk5J https://t.co/Rc9GZGQRAH https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html | MAlajab |
2020-09-24 19:10:16 | Microsoft warns of active exploits in the wild of Zerologon vulnerability (CVE-2020-1472) https://t.co/6poWP7GGec… https://t.co/LkmpK082f0 https://buff.ly/32XKOuY https://twitter.com/i/web/status/1309205994065596416 | securezoo |
2020-09-24 19:10:15 | Microsoft warns that the Zerologon vulnerability (CVE-2020-1472) is being exploited in the wild. Urges organisation… https://t.co/4U3AsgG7dY https://twitter.com/i/web/status/1309206818745462789 | Rom_Duck |
2020-09-24 19:00:08 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/83gZRxtEqm #uscert #security https://bit.ly/3kLRwKy | ATTOGTech |
2020-09-24 18:50:03 | New post: Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/OrkZKUFq7v https://reportcybercrime.com/unpatched-domain-controllers-remain-vulnerable-to-netlogon-vulnerability-cve-2020-1472/ | digitpol_cyber |
2020-09-24 18:40:15 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/MuC11AAbQB #cert #security https://bit.ly/3kLRwKy | SiciliamConsult |
2020-09-24 18:40:15 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472https://us-cert.cisa.gov/nca… https://t.co/JnN53wMK7H https://twitter.com/i/web/status/1309198532860149760 | gregoryfarley |
2020-09-24 18:40:14 | https://t.co/xfpBlkQfAe ZeroLogon(#CVE-2020-1472) – #Attacking & #Defending http://anonymous.bravehost.com/main/2020/09/24/120959/security/ | VitalAnon |
2020-09-24 18:40:12 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/J3e8M0fUti https://sl.advdat.com/2RXZuEi | ADVDAT_OH |
2020-09-24 18:30:13 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-24 18:30:08 | Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/cuko2geOWq https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogon?utm_source=dlvr.it&utm_medium=twitter | RigneySec |
2020-09-24 18:30:06 | #infosec Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/hnx3EgQdoj https://ift.tt/340kaRH | jeffreydbrown |
2020-09-24 18:00:11 | Microsoft has detected active attacks leveraging the #Zerologon vulnerability (CVE-2020-1472). Security teams are a… https://t.co/ISTiMhoKJb https://twitter.com/i/web/status/1309188505399169028 | qualys |
2020-09-24 18:00:08 | The weaponized #Microsoft vulnerability is now being exploited in the wild. CVE-2020-1472. You need to patch for it… https://t.co/kWRR8cl3Pc https://twitter.com/i/web/status/1309189869466537986 | brycea |
2020-09-24 17:50:08 | CVE-2020-1472 - Zerologon. Apparently there are attacks against this is in the wild, according to some Sherlock Hol… https://t.co/59o2Jfvb6X https://twitter.com/i/web/status/1309187289600360452 | Seven_Stones |
2020-09-24 17:20:07 | #SMB #Samba addresses the CVE-2020-1472 #Zerologon #Vulnerability #CyberSecurity #infosecurity #Hacking #pentesting https://t.co/kRj68QArpp https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html | misaelban |
2020-09-24 17:10:03 | https://t.co/pAQHh3ec9c #mobile #powerapps #Other #CVE-2020-1472 #microsoft #Scott Caveza #Tenable #Windows Server… https://t.co/71rN4tjwIe https://krebsonsecurity.com/2020/09/microsoft-attackers-exploiting-zerologon-windows-flaw/...#tech https://twitter.com/i/web/status/1309178125134311424 | DonPistulka |
2020-09-24 17:00:19 | Microsoft strongly recommends to apply security updates for CVE-2020-1472 #Zerologon which has been exploited in th… https://t.co/nwux8oXaYM https://twitter.com/i/web/status/1309173881735962624 | QatarCERT |
2020-09-24 16:50:07 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/eckeMeAnUQ https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html | Dinosn |
2020-09-24 16:10:09 | A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/HkdWGAlMS1 https://twitter.com/i/web/status/1309160692763840515 | Kasperskybrasil |
2020-09-24 16:10:04 | Microsoft warns again about getting the Windows Server Netlogon vulnerability (CVE-2020-1472) patched. https://t.co/7MIdC5Uc2n https://twitter.com/MsftSecIntel/status/1308941504707063808 | kurmac |
2020-09-24 16:10:04 | Microsoft warns that the Zerologon vulnerability (CVE-2020-1472) is being exploited in the wild. Urges organisation… https://t.co/xQpY1dnTuz https://twitter.com/i/web/status/1309162436726005762 | virusbtn |
2020-09-24 16:00:12 | Blah blah blah CVE-2020-1472 blah blah blah zerologon blah blah blah Kali Linux blah blah blah I made a video. https://t.co/HIc8to27Ey https://www.youtube.com/watch?v=-5KwcOAE-4k | DCAU7 |
2020-09-24 15:10:12 | #ZeroLogon CVE-2020-1472. If you have your #FortiGates with IPS, the Signature is ready to go. https://t.co/yCHFboLAVY https://lnkd.in/gcFkgbg | sardinasa |
2020-09-24 15:00:05 | FYI: While this does specifically for Windows Domains Controllers CVE-2020-1472 also works for Samba acting as a do… https://t.co/lMdLXOcJaP https://twitter.com/i/web/status/1309144130958880769 | TomLawrenceTech |
2020-09-24 15:00:05 | Vulnérabilité Microsoft Zerologon / Netlogon CVE-2020-1472 activement exploitée —> recommandations des experts… https://t.co/uihnlFjW32 https://twitter.com/i/web/status/1309143859218259968 | argevise |
2020-09-24 14:40:13 | Die Sicherheitslücke CVE-2020-1472 „Zerologon“ im Netlogon-Protokoll ermöglicht Angreifern die Übernahme von Domäne… https://t.co/LHU1l4dcuZ https://twitter.com/i/web/status/1309138051516555270 | Kaspersky_DACH |
2020-09-24 14:40:12 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/WlXFtcoxDt https://t.co/5yn2MFklmh http://dlvr.it/RhGjbN | owaspseattle |
2020-09-24 14:40:06 | Die Sicherheitslücke CVE-2020-1472 „Zerologon“ im Netlogon-Protokoll ermöglicht Angreifern die Übernahme von Domäne… https://t.co/C2bP70Jooh https://twitter.com/i/web/status/1309139616931491840 | ikommgmbh |
2020-09-24 14:20:05 | Microsoft: Hackers using Zerologon exploits in attacks, patch now! https://t.co/IK29HuInCx ZeroLogon CVE-2020-1472… https://t.co/60NBswiiS9 https://buff.ly/3052Jy6 https://twitter.com/i/web/status/1309134555794857986 | vtconsultingnet |
2020-09-24 14:10:06 | URGENT: Please patch now! Attackers are actively exploiting CVE-2020-1472 Netlogon EoP vulnerability, dubbed Zerolo… https://t.co/6C6mASujeY https://twitter.com/i/web/status/1309131494657527816 | reybango |
2020-09-24 14:10:05 | This is also why it's important to patch for ZeroLogon / CVE-2020-1472 Netlogon EoP vulnerability. A full exploit h… https://t.co/sgku9S0m0X https://twitter.com/i/web/status/1309131787596169217 | reybango |
2020-09-24 13:50:05 | "CVE-2020-1472 is probably going to get weaponized pretty quickly." Our CISO, @phat_hobbit, on the money once again… https://t.co/8rXFTgKxyL https://twitter.com/i/web/status/1309127095617040384 | Cyjax_Ltd |
2020-09-24 13:00:08 | @Chop24234166 @ashwinpatil @cglyer Azure ATP is “Suspected Netlogon privilege elevation attempt (CVE-2020-1472 expl… https://t.co/H5TQJxpND7 https://twitter.com/i/web/status/1309113565941465088 | GossiTheDog |
2020-09-24 12:50:04 | If you didn't patch CVE-2020-1472 "the Netlogon Elevation of Privilege Vulnerability", you are really playing with… https://t.co/DWUMdwJh15 https://twitter.com/i/web/status/1309112439649316864 | circl_lu |
2020-09-24 12:40:06 | https://t.co/oeEowd8e30 CVE-2020-1472 Zerologon Microsoft https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | morimori_nori |
2020-09-24 12:40:04 | Microsoft Says Hackers Actively Targeting Zerologon Vulnerability (CVE-2020-1472) https://t.co/GctAkrYKw6 https://www.securityweek.com/microsoft-says-hackers-actively-targeting-zerologon-vulnerability | SecurityWeek |
2020-09-24 12:30:04 | CVE-2020-1472 aka Zerologon https://t.co/WwugBwSQyP https://www.netscylla.com/blog/2020/09/23/CVE-2020-1472-Zerologon.html | _muno_ |
2020-09-24 12:20:05 | An interesting news about "Samba addresses the CVE-2020-1472 Zerologon Vulnerability" at https://t.co/dMdKkYWhny https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerability | _Wr0ngName_ |
2020-09-24 11:50:06 | CVE-2020-1472 / Zerologon is a great example of the value of virtual patching featured in our products. See why… https://t.co/5fgsKHMX33 https://twitter.com/i/web/status/1309097058511527948 | trendmicro_mea |
2020-09-24 11:40:12 | CVE-2020-1472 is now being exploited - see the @ncsc_gov_ie advisory at https://t.co/2W0NuoAgD4 https://t.co/cy11BYiQSl https://www.ncsc.gov.ie/pdfs/ZeroLogon_160920.pdf https://twitter.com/MsftSecIntel/status/1308941504707063808 | ncsc_gov_ie |
2020-09-24 11:40:05 | I wonder if anyone used the "Exploitability Assessment" field for Zerologon CVE-2020-1472 as an excuse for why it d… https://t.co/soFYYO6gQ0 https://twitter.com/i/web/status/1309094984155570178 | wdormann |
2020-09-24 11:30:09 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/uYrcdm81k9 https://t.co/Ngj48FOGgf https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ https://twitter.com/hyougetu18313/status/1309090909599010816 | hyougetu18313 |
2020-09-24 11:10:04 | An interesting blog post on #ZeroLogon CVE-2020-1472 https://t.co/vmbKgfyspN https://blog.zsec.uk/zerologon-attacking-defending/ | infoshaker |
2020-09-24 10:30:11 | #ZeroLogon(#CVE-2020-1472) - Attacking & Defending https://t.co/zQ6sxYTNMF #CtverAttack vs #CyberDefense… https://t.co/ybSeAq0Sxn https://blog.zsec.uk/zerologon-attacking-defending/ https://twitter.com/i/web/status/1309075385938857985 | tribal_sec |
2020-09-24 10:30:11 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/klgx4rG0ei https://twitter.com/i/web/status/1309075337670778887 | cesar_candido |
2020-09-24 10:10:03 | My Daily #TopStory: Samba addresses the CVE-2020-1472 Zerologon VulnerabilitySecurity Affairs… https://t.co/a7kmCyo2bO https://twitter.com/i/web/status/1309071945967771649 | SofiaSZM |
2020-09-24 10:00:08 | Microsoft geeft aan: actief misbruik van de kwetsbaarheid CVE-2020-1472. Mocht u updates nog niet op domaincontroll… https://t.co/c5dSAR79zk https://twitter.com/i/web/status/1309069091852955650 | ncsc_nl |
2020-09-24 09:30:05 | #DailyHackManac Top story: Samba addresses the CVE-2020-1472 Zerologon VulnerabilitySecurity Affairs… https://t.co/TzfYpF3HnT https://twitter.com/i/web/status/1309061830736740354 | _hackmanac |
2020-09-24 09:30:04 | Microsoft report active #CVE-2020-1472 Netlogon attacks #ZeroLogon in the wild against AD. Partial fix in the Augus… https://t.co/ybKzLV2mg1 https://twitter.com/i/web/status/1309061922332053511 | OccamSec |
2020-09-24 09:10:09 | CVE-2020-1472/Zerologon. As an IT manager should I worry? https://t.co/ECMX4q7rUh #bugbounty #bugbounties https://www.pentestpartners.com/security-blog/cve-2020-1472-zerologon-as-an-it-manager-should-i-worry/ | bugbounty18 |
2020-09-24 09:10:08 | Zerologon PoC (CVE-2020-1472) https://t.co/2cP7bQSvSs https://raw.githubusercontent.com/dirkjanm/CVE-2020-1472/master/cve-2020-1472-exploit.py | isseykun |
2020-09-24 09:10:05 | CVE-2020-1472 : ZeroLogon Attacking & Defending Zerologon also known as CVE-2020-1472 affects a cryptographic auth… https://t.co/auM6AlMqxK https://twitter.com/i/web/status/1309056899770441729 | Anastasis_King |
2020-09-24 08:40:05 | Azure ATP detection is called “Suspected Netlogon privilege elevation attempt (CVE-2020-1472 exploitation)”, will a… https://t.co/RDQUFBo491 https://twitter.com/i/web/status/1309048793183158282 | GossiTheDog |
2020-09-24 08:20:04 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/NaoF7huWhB https://blog.zsec.uk/zerologon-attacking-defending/ | autumn_good_35 |
2020-09-24 08:10:07 | CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/hNlknhSVMk @YouTubeより https://youtu.be/1h_wlMWwyB4 | mya626 |
2020-09-24 08:00:05 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/NqY5SIfQqo https://blog.zsec.uk/zerologon-attacking-defending/ | Dinosn |
2020-09-24 07:40:09 | #ZeroLogon (CVE-2020-1472) Attacking & Defending https://t.co/m6XdAiQyYS https://blog.zsec.uk/zerologon-attacking-defending/ | ixmailsaygili |
2020-09-24 07:30:04 | Patch your windows servers now! CVE-2020-1472 (otherwise known as zerologon) allows an attacker to become domain ad… https://t.co/yRVQ7aDs6J https://twitter.com/i/web/status/1309032017959563266 | Julian_Wampfler |
2020-09-24 07:30:04 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/dHMPK7qYSd https://blog.zsec.uk/zerologon-attacking-defending/ | Acardia2020 |
2020-09-24 07:20:07 | #Samba addresses the CVE-2020-1472 #Zerologon Vulnerability https://t.co/U9LaYU8r79 #securityaffairs #hacking #linux https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html | securityaffairs |
2020-09-24 07:20:04 | #Sicherheitslücke in #Windows CVE-2020-1472 | #Sicherheitsanfälligkeit in Windows #PC -Anmeldunge: https://t.co/4OhqPa3aHp https://it-services.netlogix.de/blog/sicherheitsluecke-windows-cve-2020-1472 | netlogix_de |
2020-09-24 06:20:10 | In case you missed this, PATCH your Windows Domain controllers NOW. CVE-2020-1472 | Netlogon Elevation of Privile… https://t.co/cOp3YE6dZQ https://twitter.com/i/web/status/1309012566853779462 | patrickcoomans |
2020-09-24 05:50:07 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/9Mkw8fFq2a #appsec #security #secops https://ift.tt/33WsX6W | rtcz_io |
2020-09-24 05:00:04 | Do you know about Zerologon? CVE-2020-1472, or Zerologon, is a great example of the value of virtual patching featu… https://t.co/zvxBmc1WX6 https://twitter.com/i/web/status/1308994315738284037 | TrendMicroANZ |
2020-09-24 04:00:04 | MSの観測でも既にZerologon(CVE-2020-1472)が実際の攻撃で使われているとのこと。 https://t.co/eOAqvEkXrL https://twitter.com/MsftSecIntel/status/1308941504707063808 | autumn_good_35 |
2020-09-24 03:20:06 | ZeroLogon(CVE-2020-1472) – Attacking & Defending https://t.co/otfLqNtoWG http://hrbt.us/213316 | hardreboot |
2020-09-24 03:00:06 | New post: "ZeroLogon(CVE-2020-1472) - Attacking & Defending" https://t.co/3DgBPaZZmI https://ift.tt/3hX5fMQ | Myinfosecfeed |
2020-09-24 02:50:07 | ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/gcEAjdkXdU https://blog.zsec.uk/zerologon-attacking-defending/ | _r_netsec |
2020-09-24 02:20:04 | Crowdstrike Coverage for Zerologon (CVE-2020-1472) vulnerability https://t.co/HmI8SGQMsN #Crowdstrike #trendmicro… https://t.co/2SvHkPJmKL https://lnkd.in/gVshWry https://twitter.com/i/web/status/1308953875538350081 | dilsmax |
2020-09-24 02:10:04 | ZeroLogon(CVE-2020-1472) – Attacking & Defending https://t.co/tNGsfsfogv https://www.itsecuritynews.info/zerologoncve-2020-1472-attacking-defending/ | IT_securitynews |
2020-09-24 02:00:04 | CVE-2020-1472 のパッチあてたら出る!らしい5829〜5831が再現できず困っています(T_T) 同じ様に、5829出ないよー、という方がいる様ですね https://t.co/RVSiT5foY5 NetAppなら出… https://t.co/Yyv8eHrnFZ https://www.reddit.com/r/sysadmin/comments/iwykuh/eventid_5829_for_cve20201472/ https://twitter.com/i/web/status/1308948387140521984 | NobMiwa |
2020-09-24 01:50:04 | CVE-2020-1472 のパッチあてたら出る!らしい5829〜5831が再現できず困っています(T_T) #CVE-2020-1472 #Zerologon | NobMiwa |
2020-09-24 01:30:04 | Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerabilit… https://t.co/GskIEU6Dl4 https://twitter.com/i/web/status/1308941504707063808 | MsftSecIntel |
2020-09-24 01:10:04 | 'ICYMI #Zerologon, tracked as CVE-2020-1472, is an authentication bypass vulnerability in the Netlogon Remote Proto… https://t.co/giIe7xxueT https://twitter.com/i/web/status/1308935442818048002 | cjkonrad |
2020-09-24 00:50:03 | 話題のCVE-2020-1472「netlogon( "ZeroLogon")による認証されていないドメインの乗っ取り」についてsambaから。CVSSは9.8。パッチを適用するか、回避策としてsmb.confに「server s… https://t.co/MzDIXQY9cz https://twitter.com/i/web/status/1308931351933050881 | sen_u |
2020-09-24 00:00:05 | Microsoft released a patch for the CVE-2020-1472 vulnerability and now the proof-of-concept bug, Zerologon, is read… https://t.co/AjjnlkVxMd https://twitter.com/i/web/status/1308918129590972418 | KPAudit |
2020-09-23 23:40:05 | Netlogonの脆弱性CVE-2020-1472"ZeroLogon"についてのSambaのガイダンス https://t.co/SW1bZoSeRb https://www.samba.org/samba/security/CVE-2020-1472.html | EurekaBerry |
2020-09-23 23:10:03 | #Samba addresses the #CVE-2020-1472 #Zerologon #Vulnerability https://t.co/w2k0e4gReT http://ow.ly/9nuX50BzyIm | omvapt |
2020-09-23 22:40:03 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/pjdb8W31RQ http://dlvr.it/RhDJNT | djonesax |
2020-09-23 22:20:03 | 米国土安全保障省のCISAはWindowsサーバーの脆弱性「CVE-2020-1472」に関しセキュリティアップデートを適用するよう各政府機関に緊急通達を出した。ドメインコントローラにNetlogonセキュアチャネルの接続を確立す… https://t.co/VX1BMz3P9E https://twitter.com/i/web/status/1308893549358874624 | ismsecuritynews |
2020-09-23 21:00:03 | SIOSセキュリティブログを更新しました。 Sambaの脆弱性情報(Critical: CVE-2020-1472 (ZeroLogon)と修正バージョン(4.12.7, 4.11.13, 4.10.18))… https://t.co/AutoyFkA7L https://twitter.com/i/web/status/1308873774650064898 | omokazuki |
2020-09-23 20:50:04 | #Samba addresses the CVE-2020-1472 #Zerologon Vulnerability - https://t.co/U9LaYU8r79 #securityaffairs #hacking #linux https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html | securityaffairs |
2020-09-23 20:40:04 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/3qEy2uoef8 https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerability | 01ra66it |
2020-09-23 20:10:05 | Abusing CVE-2020-1472 (ZeroLogon) https://t.co/B0a7xEqBCL https://t.co/sKjaHUwHXI https://buff.ly/3iXs3NU | mindful_monk |
2020-09-23 20:10:04 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/TbSUm6haVd #Infosec https://ift.tt/3j3EVCk | SecUnicorn |
2020-09-23 20:00:04 | Un informe fue publicado en dónde se explicaba CVE-2020-1472 a nivel técnico, vulnerabilidad de los servidores Wind… https://t.co/XPvoKYzNOB https://twitter.com/i/web/status/1308858681426161665 | ResistanceSas |
2020-09-23 19:40:06 | Found some time to read up on CVE-2020-1472 https://t.co/4ySaDh1nCv and I guess we know where the guy who wrote tha… https://t.co/8vCwjtnGfo https://www.cynet.com/zerologon https://twitter.com/i/web/status/1308851577244049409 | hvcco |
2020-09-23 19:20:07 | #CVE-2020-1472 #ZeroLogon Alert: ‘Critical’ Windows Vulnerability Needs Your Attention. The @Keysight_ATI team put… https://t.co/HwRBiLoIw3 https://twitter.com/i/web/status/1308846182123352066 | IXIAcom |
2020-09-23 18:30:09 | CVE-2020-1472 https://t.co/BmC2HtUEmi #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-23 18:20:09 | Detecting and Preventing Exploitation of Critical ZeroLogon Windows Server Vulnerability (CVE-2020-1472)… https://t.co/w8gvRR5Q0v https://twitter.com/i/web/status/1308831583005290498 | TheHackersNews |
2020-09-23 17:10:07 | Latest: Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/zfU338yZle #blog #infosec #netsec… https://t.co/OTCagqwJwf https://www.hackademicus.nl/samba-addresses-the-cve-2020-1472-zerologon-vulnerability/ https://twitter.com/i/web/status/1308814259397292033 | Hackademicus |
2020-09-23 17:10:03 | La vulnérabilité CVE-2020-1472 surnommée Zerologon permettant à un pirate de prendre le contrôle d'un domaine Windo… https://t.co/AwBXjyfdRM https://twitter.com/i/web/status/1308815558738145280 | aveyr_tic |
2020-09-23 15:51:07 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/gtFtuCNnHp http://dlvr.it/RhBxZX | AcooEdi |
2020-09-23 15:50:04 | Samba addresses the CVE-2020-1472 Zerologon #Vulnerability https://t.co/d4byAJkXfz #SecurityAffairs https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerability | SecurityNewsbot |
2020-09-23 15:50:03 | Microsoft's patch for the CVE-2020-1472 #vulnerability in the #Netlogon protocol aka #Zerologon is an update you sh… https://t.co/8q7WCm31oM https://twitter.com/i/web/status/1308795731428474881 | lgomezperu |
2020-09-23 15:20:05 | securityaffairs write "Samba addresses the CVE-2020-1472 Zerologon Vulnerability" See full original article:… https://t.co/VsKzyzE7mi https://twitter.com/i/web/status/1308787147458203648 | InfoSecPhysa |
2020-09-23 15:20:05 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/sflurHzZX1 https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=dlvr.it&utm_medium=twitter&utm_campaign=samba-addresses-zerologon-vulnerability | HackerSpyNet1 |
2020-09-23 15:10:06 | Threat Brief: CVE-2020-1472, also known as "Zerologon," has a "critical" security rating from Microsoft and a CVSS… https://t.co/DJoDFkanBW https://twitter.com/i/web/status/1308783200265797632 | Nick_Kanavas |
2020-09-23 15:10:05 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/PJiMRxorzA https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerability | security_inside |
2020-09-23 15:10:04 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/nmBWIB7Kp8 https://www.itsecuritynews.info/samba-addresses-the-cve-2020-1472-zerologon-vulnerability/ | IT_securitynews |
2020-09-23 15:10:04 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/HUVWOCtQIs https://twitter.com/i/web/status/1308785168640020482 | deepwatch_sec |
2020-09-23 15:00:20 | r/t "Samba addresses the CVE-2020-1472 Zerologon Vulnerability" https://t.co/Vh0BZvpr61 https://bit.ly/301oZc6 | profxeni |
2020-09-23 14:41:57 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/BY1tiI4EsP #cybersecurity https://t.co/85SmJvi4Kx http://twib.in/l/p67jx8zbR9GE | aglongo |
2020-09-23 14:41:53 | #Samba addresses the CVE-2020-1472 #Zerologon Vulnerability https://t.co/U9LaYU8r79 #securityaffairs #hacking #linux https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html | securityaffairs |
2020-09-23 14:40:55 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability: Samba team has released a security patch to address the… https://t.co/BMkwHRx1dH https://twitter.com/i/web/status/1308777277539250177 | shah_sheikh |
2020-09-23 14:40:53 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/4R8ve1rHmf https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerability | thedpsadvisors |
2020-09-23 14:40:49 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/vIxT0pMdZa #Security #CVE20201472… https://t.co/TJx3GaF7yj https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerability https://twitter.com/i/web/status/1308777329737502722 | LudovicoLoreti |
2020-09-23 14:40:28 | Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/FzcjSprTpw http://dlvr.it/RhBxlt | FiveGmbh |
2020-09-23 14:12:14 | #Microsoft's patch for the CVE-2020-1472 vulnerability in the Netlogon protocol aka Zerologon is an update you shou… https://t.co/e1Azn29nLV https://twitter.com/i/web/status/1308768158380064768 | kaspersky |
2020-09-23 14:12:06 | Grâce au Patch Tuesday d’août #Microsoft a corrigé plusieurs vulnérabilités dont CVE-2020-1472. La vulnérabilité du… https://t.co/mmFIHzMLfk https://twitter.com/i/web/status/1308768456112844800 | kasperskyfrance |
2020-09-23 13:40:12 | そういえばソースコード忘れてたので追記します CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/sgveHHDlli @YouTubeより https://youtu.be/1h_wlMWwyB4 | fwarashi |
2020-09-23 13:20:08 | CVE-2020-1472/Zerologon. As an IT manager should I worry? https://t.co/UtSpwPn9bA #CyberSecurity https://www.pentestpartners.com/security-blog/cve-2020-1472-zerologon-as-an-it-manager-should-i-worry/ | Gate_15_Analyst |
2020-09-23 13:10:13 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/pxpHju0mDQ https://twitter.com/i/web/status/1308754750335315969 | CaraWainwright7 |
2020-09-23 13:10:08 | @msftsecresponse For confirmation, does KB4578013 include the patch for CVE-2020-1472 since it superceeds KB4571723? thanks | JGDiver1 |
2020-09-23 13:00:14 | Cómo proteger un entorno AD del CVE-2020-1472. 1) Desplegar el parche (Agosto 2020) 2) Monitorizar para ver los dis… https://t.co/nWbnd59UNk https://twitter.com/i/web/status/1308751457496240128 | manelrodero |
2020-09-23 12:50:18 | وبینار «بررسی و تحلیل آسیبپذیری CVE-2020-1472» راس ساعت ۱۸ امروز شروع میشه: https://t.co/BuKgPtf2bI https://t.co/a1E35ut08E https://bit.ly/35RTZiu https://twitter.com/RavinAcademy/status/1307323455294115848 | RavinAcademy |
2020-09-23 12:00:16 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/Z14BD4Jm88 #MSIgnite https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | samilaiho |
2020-09-23 11:40:09 | Point and click remote domain compromise doesn't get much worse than Zerologon (CVE-2020-1472 Critical Privilege Es… https://t.co/J9gBpiQnqk https://twitter.com/i/web/status/1308730471916994561 | pwntestpartners |
2020-09-23 11:10:10 | #Cybersecurity #InfoSec CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección ~ Flu… https://t.co/ljeFInF2js https://twitter.com/i/web/status/1308723433199591424 | SritaKaren |
2020-09-23 09:40:03 | 原理がわかりました!!! ついでに僕がCFBモードの理解間違えていたことに気がついた。block毎に暗号化すると思ってたけどスライドしながら暗号化するのか……(無駄多くない? wow) CVE-2020-1472 ZeroLog… https://t.co/b0DRzUNWLb https://twitter.com/i/web/status/1308701899168780290 | theoremoon |
2020-09-23 09:20:04 | Zer0dump is an PoC exploit tool for abusing #vulnerabilities associated with CVE-2020-1472 to initiate full system… https://t.co/C8LTLYJucq https://twitter.com/i/web/status/1308696088065576960 | blackhatcats |
2020-09-23 07:50:04 | CVE-2020-1472, or Zerologon, is a great example of the value of virtual patching featured in our products. See why… https://t.co/I8QJjnKn5W https://twitter.com/i/web/status/1308674452264280064 | TrendMicroAMEA |
2020-09-23 07:40:05 | CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección https://t.co/4X5gCcMYd0 https://ift.tt/3iV221J | SamuraiBlanco |
2020-09-23 07:30:05 | Story Nr. 2: CVE-2020-1472, auch #Zerologon genannt. Eine Sicherheitslücke mit einem Gefährlichkeits-Score von 10/1… https://t.co/kHWmFUGxds https://twitter.com/i/web/status/1308667697652260864 | haunschmidtech |
2020-09-23 07:20:07 | threatmeter: Samba Releases Security Update for CVE-2020-1472: Original release date: September 21, 2020 The Samba… https://t.co/O72JvOM6mL https://twitter.com/i/web/status/1308665493927202823 | SecurityMagnate |
2020-09-23 07:20:05 | threatmeter: Samba Releases Security Update for CVE-2020-1472 Original release date: September 21, 2020 The Samba… https://t.co/sUIT2zxxhH https://twitter.com/i/web/status/1308665520191930369 | SecurityMagnate |
2020-09-23 07:10:09 | Samba Releases Security Update for CVE-2020-1472 Original release date: September 21, 2020 The Samba Team has rele… https://t.co/HGJOvtAHJW https://twitter.com/i/web/status/1308663000413483013 | threatmeter |
2020-09-23 06:40:03 | CVE-2020-1472 oder wie Profis sagen: Single SignOn 🤷 | TeddyKopernikus |
2020-09-23 06:20:04 | 【Windows曝重大漏洞 美国土安全部罕见催更】 美国国土安全部日前向政府部门发出紧急警告,强烈要求所有采用微软Windows Sever各版本的相关机构,立即修补名为CVE-2020-1472的严重资安漏洞,避免被黑客用来… https://t.co/vH3Kgi3ADS https://twitter.com/i/web/status/1308650775338536960 | crystal78243104 |
2020-09-23 06:10:12 | Windowsドメインコントローラーの乗っ取りを許す可能性のある、Netlogonプロトコルの脆弱性CVE-2020-1472(別名:Zerologon)について。 該当する環境をお持ちの場合はご対応を。Microsoftから出て… https://t.co/Z0pfMCRb7b https://twitter.com/i/web/status/1308647362689200128 | kaspersky_japan |
2020-09-23 05:20:07 | CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección https://t.co/6eVZdWF5vP https://ift.tt/3iV221J | 3m1l |
2020-09-23 05:20:07 | [Recomendado]CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección… https://t.co/mmX8tWgvA4 https://twitter.com/i/web/status/1308634920663818241 | seguridad_si |
2020-09-23 05:20:07 | CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección🏴☠️🔒 #hacking #cibersecurity https://t.co/TYodAqqFWT https://www.flu-project.com/2020/09/zerologon.html | andalinux |
2020-09-23 05:10:06 | CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección - https://t.co/rqYwbtUiWp vía @fluproject http://www.flu-project.com/2020/09/zerologon.html | ZerolynxOficial |
2020-09-23 05:10:04 | CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección - https://t.co/EWIw5nRlVE. por… https://t.co/Sy6elxP3Xl https://www.flu-project.com/2020/09/zerologon.html https://twitter.com/i/web/status/1308633299175211008 | fluproject |
2020-09-23 05:00:05 | #Zerologon detection: a technical analysis of CVE-2020-1472 and how to detect it. https://t.co/tlnjCW8Zs1 https://www.cynet.com/attack-techniques-hands-on/zerologin-vulnerability-analysis-and-detection-tools/ | _j0sh_adams_ |
2020-09-23 04:30:03 | A blogpost to provide an overview of #CVE-2020-1472 ( #Zerologon) along with what you can do in terms of exploitati… https://t.co/qpD5md5kwH https://twitter.com/i/web/status/1308624460887420933 | riyazwalikar |
2020-09-23 04:00:04 | CVE-2020-1472をテストできるスクリプト https://t.co/c6qDq2ruz9 https://github.com/SecuraBV/CVE-2020-1472 | GOETAN_GOETAN |
2020-09-23 04:00:04 | 最新編號CVE-2020-1472,又名為Zerologon的漏洞 記得修補一下漏洞 https://t.co/yCH6WnT8wV https://www.ithome.com.tw/news/140090 | m54068 |
2020-09-23 04:00:03 | おもしろい(おもしろくない) 【Zerologon(CVE-2020-1472)】PoC有りWindowsのドメインコントローラが乗っ取られる脆弱性の仕組みと対策 https://t.co/1pV80pv5nq https://at-virtual.net/%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3/%e3%80%90cve-2020-1472%e3%80%91poc%e6%9c%89%e3%82%8awindows%e3%81%ae%e3%83%89%e3%83%a1%e3%82%a4%e3%83%b3%e3%82%b3%e3%83%b3%e3%83%88%e3%83%ad%e3%83%bc%e3%83%a9%e3%81%8c%e4%b9%97%e3%81%a3%e5%8f%96/ | maguro_infra |
2020-09-23 03:40:04 | 今週の #セキュリティのアレ も面白かった! 最初の根岸さんから紹介があった脆弱性 Zerologon(CVE-2020-1472)の話、めっちゃCTF問!ivが0固定で設定されていることに起因して、暗号文が推測しやすくなっちゃう… https://t.co/GBryX2IpuT https://twitter.com/i/web/status/1308609592331362306 | kusuwada |
2020-09-23 02:50:05 | Sambaの複数の脆弱性情報(Critical: CVE-2020-1472 (ZeroLogon)と修正バージョン(4.12.7, 4.11.13, 4.10.18) - OSS脆弱性ブログ https://t.co/0BDuGtSpRm https://security.sios.com/vulnerability/samba-security-vulnerability-20200924.html | ohhara_shiojiri |
2020-09-23 02:30:03 | A new vulnerability – CVE-2020-1472. #Zerologon, allows an attacker to use the Netlogon process to impersonate iden… https://t.co/mwDgSWgwcQ https://twitter.com/i/web/status/1308592152839155714 | astevens15 |
2020-09-23 01:20:02 | Samba: CVE-2020-1472 Unauthenticated domain takeover via netlogon ("ZeroLogon") #Samba #windows #infosec #security https://t.co/YIHqXK0Ket https://www.samba.org/samba/security/CVE-2020-1472.html | ozuma5119 |
2020-09-22 23:40:03 | The latest update for #Splunk includes "Splunking #Azure: Event Hubs" and "Detecting CVE-2020-1472 (CISA ED 20-04)… https://t.co/kxMzizLV0B https://twitter.com/i/web/status/1308549683875328000 | opsmatters_uk |
2020-09-22 21:10:13 | Proof-of-concept (POC) code was published to exploit an elevation of privilege vulnerability – CVE-2020-1472 – foun… https://t.co/D4xmLr54rG https://twitter.com/i/web/status/1308511549653475329 | tssecure |
2020-09-22 21:00:03 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/0fW5hAZh38 https://twitter.com/i/web/status/1308510388632387597 | steveneville1 |
2020-09-22 20:30:07 | Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/I8cxoz9x7H https://twitter.com/Palabradehacker/status/1308501278746644487 | SLujanTwT |
2020-09-22 20:10:07 | Samba Releases Security Update for CVE-2020-1472: Original release date: September 21, 2020 The Samba Team has… https://t.co/emToYfdVe4 https://goo.gl/fb/DRKiu9 | threatmeter |
2020-09-22 19:00:03 | Just found out about CVE-2020-1472 from CISA 20-04. It's crazy how (pretty) simple it was to exploit this. From wha… https://t.co/kJTgcw8eRV https://twitter.com/i/web/status/1308480569664303105 | RobbieBePoppin |
2020-09-22 19:00:03 | Samba Releases Security Update for CVE-2020-1472 https://t.co/MjWcintxsS https://www.samba.org/samba/security/CVE-2020-1472.html | AnonAnonymous |
2020-09-22 18:30:12 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-22 18:10:02 | These are the two SIEM rules to detect Netlogon (CVE-2020-1472) But my question is, what false positives have yo… https://t.co/kF51OSekkr https://twitter.com/i/web/status/1308468238217547776 | blueteamblog |
2020-09-22 17:40:11 | Windows Admins - Beware! 'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attac… https://t.co/olJfS9MvSz https://twitter.com/i/web/status/1308458586628997120 | NickLagalante |
2020-09-22 16:40:04 | Samba addresses Critical Zerologon vulnerability (CVE-2020-1472) https://t.co/i2viAXdWkO #Samba #Zerologon… https://t.co/IDbwd2mbl5 https://buff.ly/3kIQgrx https://twitter.com/i/web/status/1308443630982619138 | securezoo |
2020-09-22 16:20:03 | 🚨 La faille #Zerologon fait trembler le département de la sécurité intérieure US 💣 La récente faille CVE-2020-1472… https://t.co/hsI1xFmKs9 https://twitter.com/i/web/status/1308438508697079809 | Prohacktiv3 |
2020-09-22 16:00:05 | CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/sgveHHDlli @YouTubeより https://youtu.be/1h_wlMWwyB4 | fwarashi |
2020-09-22 16:00:04 | New post: แจ้งเตือนช่องโหว่ระดับวิกฤติ Zerologon (CVE-2020-1472) ยึด Domain controller ได้ มีโค้ดโจมตีแล้ว – Bangko… https://t.co/J6eeGl3f8W https://twitter.com/i/web/status/1308434831529766915 | digitpol_cyber |
2020-09-22 15:30:03 | Samba Releases Security Update for CVE-2020-1472 https://t.co/jSpa64Ednr https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 | DoITSecurity |
2020-09-22 15:20:04 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/xoZxPfdQOS https://twitter.com/i/web/status/1308423816104808450 | TrendMicroUK |
2020-09-22 14:10:03 | Detecting CVE-2020-1472 (CISA ED 20-04) Using #Splunk Attack Range https://t.co/gAD5FvSN8B @splunk https://t.co/Y3w069vDfl https://splk.it/2FYJOOa | hurricanelabs |
2020-09-22 13:50:03 | Security Alert: Microsoft Update CVE-2020-1472 Available to Address Critical Security Vulnerability in Windows Doma… https://t.co/XwbN0dQU5S https://twitter.com/i/web/status/1308401507805605888 | Databranch |
2020-09-22 13:20:04 | Samba Releases Security Update for CVE-2020-1472 https://t.co/O2E1In6QhD https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 | microkeyword |
2020-09-22 13:10:03 | “【Zerologon(CVE-2020-1472)】PoC有りWindowsのドメインコントローラが乗っ取られる脆弱性の仕組みと対策 – Self branding” https://t.co/yXMl8Zad4R https://htn.to/2MyGQcS9Pa | waiha8 |
2020-09-22 13:00:03 | Samba Releases Security Update for CVE-2020-1472 https://t.co/tsnN3leMTq https://t.co/Ze86ZSY7Lg https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 | SecureNetIT |
2020-09-22 13:00:03 | Security News - Samba A security update has been released for CVE-2020-1472 https://t.co/sZBgYgNlax https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update/cve-2020-1472 | pcdoctorswr |
2020-09-22 12:50:02 | Befehl von ganz oben: CVE-2020-1472 patchen https://t.co/CDlg3D6uqA https://buff.ly/3hSjzq1 | inside_it |
2020-09-22 12:30:03 | Samba is also affected by the Zerologon vulnerability (CVE-2020-1472) - https://t.co/4LQO1sreaG - #cybersecurity… https://t.co/GC8aZ9qmtb https://www.samba.org/samba/security/CVE-2020-1472.html https://twitter.com/i/web/status/1308380613473382401 | ZeljkaZorz |
2020-09-22 12:20:03 | The Zero-LogOn Exploit (CVE-2020-1472) https://t.co/451iDzofJf https://hubs.ly/H0wGR8m0 | Security7Net |
2020-09-22 12:20:02 | Security Releases available for SAMBA+ 4.12.7, 4.11.13 and 4.10.18 – the packages address CVE-2020-1472 (#ZeroLogon… https://t.co/0xtoYlYtOS https://twitter.com/i/web/status/1308380352726142976 | SAMBAplus |
2020-09-22 12:10:04 | Following last week’s buzz on CVE-2020-1472, which is a flaw on the Netlogon protocol, Samba announced new patches.… https://t.co/C9X2mTkBqb https://twitter.com/i/web/status/1308375618690732033 | SeconCyber |
2020-09-22 11:50:03 | 先日Retired ステータスになった #HackTheBox の「Multimaster」マシン。 ZeroLogin(CVE-2020-1472)脆弱性が刺さるらしい。 今ならまだ無料で実機を用意せずに話題の脆弱性についてトラ… https://t.co/NdbMS1haT4 https://twitter.com/i/web/status/1308372237909520384 | v_avenger |
2020-09-22 11:50:03 | If you have not applied @Microsoft patch CVE-2020-1472 released in August, do so now... The @USCERT_gov issued an… https://t.co/tbl1AHatzy https://twitter.com/i/web/status/1308371727601238016 | thingssandy |
2020-09-22 11:30:04 | “Samba Releases Security Update for CVE-2020-1472 | CISA” https://t.co/sGrfhcadvI https://htn.to/418EhnLSD2 | waiha8 |
2020-09-22 11:20:02 | CVE-2020-1472 / “Samba - Security Announcement Archive” https://t.co/DMxLT1fM3C https://htn.to/ftpUnyTNLi | waiha8 |
2020-09-22 10:10:35 | Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren | https://t.co/f6M1IChZO7 https://t.co/UEl9Uh7SLt http://ZDNet.de https://buff.ly/3iVJnTA | DSAgentur |
2020-09-22 10:00:07 | CISA Releases Emergency Directive on Microsoft Windows Netlogon Remote Protocol #CVE-2020-1472. An unauthenticated… https://t.co/bqVmXrTYER https://twitter.com/i/web/status/1308344045090025477 | torvalstrom |
2020-09-22 08:40:10 | Samba Releases Security Update for CVE-2020-1472: https://t.co/3OMc0UzYxS #follow & #RT #cybersecurity #infosec https://ift.tt/33KMLdz | KeoXes |
2020-09-22 08:30:12 | Top story: Samba Releases Security Update for CVE-2020-1472 | CISA https://t.co/AJFgcgDszF, see more https://t.co/op6V5mLutF https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 http://tweetedtimes.com/v/16476?s=tnp | infowaropcenter |
2020-09-22 08:30:05 | Defensive Guidance for ZeroLogon (CVE-2020-1472) #hunt #detect https://t.co/rgRmtqmorz https://t.co/R2lyo9NQUS https://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ https://github.com/GossiTheDog/ThreatHunting/tree/master/AzureSentinel | ahmet_han64 |
2020-09-22 08:00:06 | Samba has released security updates to address CVE-2020-1472 ^ID https://t.co/9IdhD9kRdG https://go.usa.gov/xGPSU | MOQdigitalSOC |
2020-09-22 07:50:21 | Do you want to quickly test your network for the CVE-2020-1472 #Zerologon vulnerability on a Windows system without… https://t.co/6PaQzmzVR4 https://twitter.com/i/web/status/1308310120678518785 | su13ym4n |
2020-09-22 07:40:55 | How to safely test the #CVE-2020-1472 #Zerologon #vulnerability on a #Windows environment, without installing… https://t.co/tbeIWigrdc https://twitter.com/i/web/status/1308307566112509953 | PicusSecurity |
2020-09-22 07:40:43 | Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/Ewv5PmZGFj #Windows… https://t.co/NwEuiG4b68 https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html https://twitter.com/i/web/status/1308308084763353088 | ptracesecurity |
2020-09-22 07:40:16 | #blognon ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง… https://t.co/KB9UCdyPKf https://twitter.com/i/web/status/1308309395999162368 | OutdoWorld |
2020-09-22 07:30:08 | Samba Releases Security Update for CVE-2020-1472 https://t.co/QKMVoIVQUV https://ift.tt/33KMLdz | bug_less |
2020-09-22 07:10:14 | Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack... https://t.co/lu106oitr9 https://t.co/Ydn7VyzDkz… https://t.co/JQ8c67MFS0 http://news.torii-security.fr/s/nwryzx https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html https://twitter.com/i/web/status/1308300008815435776 | torii_security |
2020-09-22 07:10:11 | Samba Releases Security Update for CVE-2020-1472 https://t.co/WLcnrHAzcB #uscert #gov https://buff.ly/32O9rKr | NotTruppi |
2020-09-22 07:10:07 | Samba Releases Security Update for CVE-2020-1472 https://t.co/e3xhdlevu2 https://ift.tt/33KMLdz | cyberbuzznews |
2020-09-22 06:20:11 | @CISAgov Emergency @Windows patch directive ; patch CVE-2020-1472 do it ASAP. The CVSS-perfect 10 flaw that … https://t.co/B4N0W2nllj https://twitter.com/i/web/status/1308287426016808960 | PeterJopling |
2020-09-22 06:10:04 | Samba Releases Security Update for CVE-2020-1472 https://t.co/5tn3N63Koq #CERT #CyberSecurity #InfoSec #SOC #TousSecNum https://bit.ly/3hPKLWs | cyberdian_cert |
2020-09-22 05:50:03 | CVE-2020-1472を検証しようとAzure契約したのにAD作ろうとしたらKB4577015入っちゃって消せなくて悲しみ(-́◞८͙༙◟-̀) | SecNiku |
2020-09-22 05:45:39 | CVE-2020-1472 Netlogon Vulnerability An unauth priv escalation vulnerability was found in Netlogon Remote Protocol… https://t.co/xKfy7gaDi9 https://twitter.com/i/web/status/1307967553885663232 | TheCyphere |
2020-09-22 05:40:04 | Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren https://t.co/y1d7fM3Iyp https://t.co/d3dLCb2uoY http://dlvr.it/Rh5VbW | hugenerinfo |
2020-09-22 05:30:03 | Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren - https://t.co/71MQ0iEQJf https://blog.com-sys.de/2020/09/22/zerologon-us-behoerden-sollen-patch-fuer-cve-2020-1472-installieren/ | ComSysGmbH |
2020-09-22 02:20:03 | なんだかまたインフラ屋さんが大変になってそうだ Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/Twi8IYux3r @jpcert https://www.jpcert.or.jp/newsflash/2020091601.html | nao_hucky |
2020-09-22 02:10:03 | Samba Releases Security Update for CVE-2020-1472 https://t.co/59fStL7Acf #HSToday https://bit.ly/2FY7baN | HSTodayMag |
2020-09-22 01:30:03 | 【Zerologon(CVE-2020-1472)】PoC有りWindowsのドメインコントローラが乗っ取られる脆弱性の仕組みと対策 https://t.co/yprhlKFwNW https://at-virtual.net/%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3/%E3%80%90cve-2020-1472%E3%80%91poc%E6%9C%89%E3%82%8Awindows%E3%81%AE%E3%83%89%E3%83%A1%E3%82%A4%E3%83%B3%E3%82%B3%E3%83%B3%E3%83%88%E3%83%AD%E3%83%BC%E3%83%A9%E3%81%8C%E4%B9%97%E3%81%A3%E5%8F%96/ | 0x009AD6_810 |
2020-09-22 00:10:04 | A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/aNVczCrh63 https://twitter.com/i/web/status/1308194561097961472 | Kasperskybrasil |
2020-09-21 23:30:02 | The latest update for #CloudPassage includes "#Zerologon: Windows Netlogon Vulnerability CVE-2020-1472" and "AWS… https://t.co/R5dG7ImJHw https://twitter.com/i/web/status/1308184755628843008 | opsmatters_uk |
2020-09-21 23:20:05 | [日本語: Japanese] CVE-2020-1472 Zerologon 攻撃検証デモ - YouTube https://t.co/TtPjRFlgXn https://www.youtube.com/watch?v=qsMvCLPjSpc | 0x009AD6_810 |
2020-09-21 22:50:05 | Samba "ZeroLogon"の脆弱性を修正 | Samba Releases Security Update for CVE-2020-1472 https://t.co/U47TzZzJW2 https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 | muumuubokujo |
2020-09-21 22:00:03 | Samba Releases Security Update for CVE-2020-1472 https://t.co/POE1MQNmvM http://dlvr.it/Rh4ZrZ | amolsarwate |
2020-09-21 21:50:03 | Serious question on CVE-2020-1472. How many are just rushing to patch domain controllers, and how many are patching all windows servers? | infosec_4life |
2020-09-21 21:40:06 | Samba Releases Security Update for CVE-2020-1472 https://t.co/tIDapq5H09 https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 | nekochanSec555 |
2020-09-21 21:30:05 | ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง | Blognone… https://t.co/6lX6qcjimM https://twitter.com/i/web/status/1308154971947503617 | Saipaannana |
2020-09-21 21:30:04 | Company named Secura detailed how one could exploit CVE-2020-1472.Named the process “Zerologon” because it allows a… https://t.co/IP516UI7jn https://twitter.com/i/web/status/1308156227621330945 | piperwalt1 |
2020-09-21 21:30:04 | The latest update for #Splunk includes "Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range" and "Spl… https://t.co/wTCg091crK https://twitter.com/i/web/status/1308155872867123200 | opsmatters_uk |
2020-09-21 21:30:03 | Samba Releases Security Update for CVE-2020-1472 | CISA https://t.co/zARMwhh9ew https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 | _T_MKI |
2020-09-21 21:20:06 | Samba Releases Security Update for CVE-2020-1472 https://t.co/p2aBZs6TwQ https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 | HenkvanRoest |
2020-09-21 21:10:04 | Here's how you can find and remediate the latest vulnerability Zerologon (CVE-2020-1472) using Tanium. #Zerologon… https://t.co/6NxIfS8h1L https://twitter.com/i/web/status/1308150055711502337 | smullis |
2020-09-21 21:10:04 | Here's how you can find and remediate the latest vulnerability Zerologon (CVE-2020-1472) using Tanium. #Zerologon… https://t.co/6rsslK49vS https://twitter.com/i/web/status/1308149655910445056 | imPOSHster |
2020-09-21 20:50:04 | CERT Samba Releases Security Update for CVE-2020-1472 https://t.co/Y5jEcuNiyi https://bit.ly/32QaN7N | PAUL_CSFI |
2020-09-21 20:40:15 | Here's how you can find and remediate the latest vulnerability Zerologon (CVE-2020-1472) using Tanium. #Zerologon… https://t.co/UFsws7v1g2 https://twitter.com/i/web/status/1308141457904218113 | Tanium |
2020-09-21 20:30:04 | Samba has released security updates to address CVE-2020-1472. Learn more at https://t.co/VhdVRMS0VA. #Cyber #Cybersecurity #InfoSec https://go.usa.gov/xGPSU | USCERT_gov |
2020-09-21 20:10:02 | Samba Releases Security Update for CVE-2020-1472 https://t.co/6fOKdfa0XH https://www.itsecuritynews.info/samba-releases-security-update-for-cve-2020-1472/ | IT_securitynews |
2020-09-21 20:00:06 | #infosec Samba Releases Security Update for CVE-2020-1472 https://t.co/7kkysiV8it https://ift.tt/33KMLdz | jeffreydbrown |
2020-09-21 20:00:05 | ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง… https://t.co/UmrlysaoeQ https://twitter.com/i/web/status/1308131464094134273 | ArchMerciGod |
2020-09-21 20:00:04 | Samba Releases Security Update for CVE-2020-1472 https://t.co/yh6grj31QG #uscert #security https://bit.ly/3iQPYyl | ATTOGTech |
2020-09-21 19:40:03 | Samba Releases Security Update for CVE-2020-1472 https://t.co/Gi5i2cRnKZ https://sl.advdat.com/2RNjc5m | ADVDAT_OH |
2020-09-21 19:40:03 | Samba Releases Security Update for CVE-2020-1472 https://t.co/dtXSAU24Li #cert #security https://bit.ly/3iQPYyl | SiciliamConsult |
2020-09-21 19:40:03 | Truth about CVE-2020-1472 no one want to tell you I will , before even you reach that vul you have to make so much… https://t.co/M0lZCzN0Mc https://twitter.com/i/web/status/1308126394417905665 | _Rzero |
2020-09-21 19:30:05 | Zerologon: Windows Netlogon Vulnerability CVE-2020-1472 https://t.co/RJYdq21fx6 https://t.co/epT7ewapbX http://dlvr.it/Rh4CX6 | amolsarwate |
2020-09-21 19:30:04 | How to detect Zerologon or CVE-2020-1472? Read our latest blog to learn more https://t.co/ho6Gn0RuOv… https://t.co/r4zhPvtOPN https://bit.ly/3ci2u7E https://twitter.com/i/web/status/1308124300344307712 | cloudpassage |
2020-09-21 19:30:02 | Samba Releases Security Update for CVE-2020-1472https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-rel… https://t.co/PC9WoB54cY https://twitter.com/i/web/status/1308126016100069377 | gregoryfarley |
2020-09-21 19:20:03 | Samba Releases Security Update for CVE-2020-1472 https://t.co/hNS3A8BHvN https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472?utm_source=dlvr.it&utm_medium=twitter | RigneySec |
2020-09-21 19:20:02 | Samba Releases Security Update for CVE-2020-1472 https://t.co/093tUEwqix https://bit.ly/3iVVwYw | blu3cloak |
2020-09-21 19:10:06 | ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง https://t.co/8m2KSG7aCX #Blognone https://www.blognone.com/node/118563?utm_source=twitter&utm_medium=thaitechfeed&utm_campaign=thaitechfeed | thaitechfeed |
2020-09-21 19:10:03 | ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง https://t.co/kstmytPxR8 https://www.blognone.com/node/118563 | blognone |
2020-09-21 18:30:07 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-21 18:20:02 | Please make sure you've patched the Zerologon / CVE-2020-1472 bug "Any attacker on the local network (such as a ma… https://t.co/teyvxxoCQU https://twitter.com/i/web/status/1308108657704353792 | TheRegister |
2020-09-21 18:10:07 | Recommendations for @Microsoft #Netlogon vulnerability (CVE-2020-1472, a.k.a. #Zerologon) that allows an unauthenti… https://t.co/hYB1j1AGLX https://twitter.com/i/web/status/1308104206868508673 | qualys |
2020-09-21 18:10:07 | #Microsoft's patch for the CVE-2020-1472 vulnerability in the Netlogon protocol aka Zerologon is an update you shou… https://t.co/iHHkQmBQJ8 https://twitter.com/i/web/status/1308104118456782848 | kaspersky |
2020-09-21 18:10:05 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/lqjxvVMJFo https://twitter.com/i/web/status/1308105107914067980 | deepwatch_sec |
2020-09-21 17:50:04 | Learn how to detect the recent #Zerologon exploitation (CVE-2020-1472) in real-time, without signatures or agents,… https://t.co/EOetGecOE8 https://twitter.com/i/web/status/1308099915101253632 | ExtraHop |
2020-09-21 17:20:04 | All Synology NAS need to be upgraded to DSM v4.4.5-0101 or above to patch vulnerability CVE-2020-1472 (CVSS Score:… https://t.co/ZWHC0pToSo https://twitter.com/i/web/status/1308091847403868161 | GaetanICT |
2020-09-21 17:10:11 | Last month, #Microsoft released a patch for critical vulnerability CVE-2020-1472, also known as the Zerologon vulne… https://t.co/zX7ajesCKm https://twitter.com/i/web/status/1308088926993817600 | kaspersky |
2020-09-21 16:40:03 | Let's try CVE-2020-1472 aka Zerologon with Multimaster from HackTheBox https://t.co/pznP4GBMtT via @YouTube https://youtu.be/7lSwRQWyoHA | Masashi30555047 |
2020-09-21 16:10:07 | CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability-Government agencies ordered to deploy patches by midn… https://t.co/oTnLnZUigw https://twitter.com/i/web/status/1308073559927984129 | JeffEnglander |
2020-09-21 15:30:03 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/s6uJ0KtVHX https://twitter.com/i/web/status/1308063701283549186 | jamesgreilly |
2020-09-21 15:10:03 | Have you updated all of your @Windows Server clients to address the critical vulnerability, CVE-2020-1472? Read mor… https://t.co/yiVudLWJxg https://twitter.com/i/web/status/1308060171332186112 | KaseyaCorp |
2020-09-21 15:00:03 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/tXrKjfHwNK https://twitter.com/i/web/status/1308057384854663170 | sdemarzio75 |
2020-09-21 15:00:02 | Zerologon Proof of Concept Code Available for CVE-2020-1472 (Windows Netlogon Elevation of Privilege) https://t.co/VfkIxwSvQA https://fortiguard.com/threat-signal-report/3680/zerologon-proof-of-concept-code-now-available-cve-2020-1472-windows-netlogon-elevation-of-privilege | RMJConsulting |
2020-09-21 14:40:12 | It has been advised to immediately patch CVE-2020-1472. It allows attackers to instantly become domain admin by sub… https://t.co/XjhzHYnTxp https://twitter.com/i/web/status/1308051116333117440 | dulenkp |
2020-09-21 14:40:10 | Zerologon CVE-2020-1472 Vulnerability Automated Patching https://t.co/8wu3XG71rg https://www.virtualizationhowto.com/2020/09/zerologon-cve-2020-1472-vulnerability-automated-patching/ | vspinmaster |
2020-09-21 14:40:03 | CISA issues emergency directive on CVE-2020-1472 ('Zerologon'), for which exploit code exists in the wild https://t.co/3v2z8XPh9Z https://cyber.dhs.gov/ed/20-04/ | virusbtn |
2020-09-21 14:10:03 | “Immediate and emergency action” required to patch CVE-2020-1472, the CVSS-perfect-ten-rated flaw that allows attac… https://t.co/S4wd0dbrQR https://twitter.com/i/web/status/1308045371822702594 | Karl_Steinkamp |
2020-09-21 13:40:06 | #windowserver #patch on CVE-2020-1472 considered national #Emergency in #usa, so everybody must follow this direct… https://t.co/QjdDxOr0gx https://twitter.com/i/web/status/1308036126884716548 | IcemanRivas |
2020-09-21 13:30:04 | Threat Brief: CVE-2020-1472, also known as "Zerologon," was given a "critical" security rating from Microsoft and a… https://t.co/kRh45U2I0t https://twitter.com/i/web/status/1308033306173337601 | fhawalla |
2020-09-21 13:10:03 | US - instructs the Federal Civilian Executive Branch agencies to apply August 2020 security update (CVE-2020-1472) https://t.co/5qjuxffwyO https://twitter.com/CISAgov/status/1307148926366212099 | papervote |
2020-09-21 12:50:05 | Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren - https://t.co/qcYhCkWV39 #it-business #it #onlinemarketing @webnic https://ift.tt/32OFWs9 | webnic |
2020-09-21 12:20:06 | [- Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren -] https://t.co/sxo6VIGxPZ #ITsec #sicherheit https://ift.tt/32OFWs9 | itsecdump |
2020-09-21 12:20:05 | CVE-2020-1472 #Zerologon "Admins müssen nun handeln und Server aktualisieren. Ist das nicht möglich, müssen verwund… https://t.co/80Ss8NIURj https://twitter.com/i/web/status/1308016946978467840 | __ud3x__ |
2020-09-21 12:10:03 | New post: Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren https://t.co/TQocx7aeIC https://reportcybercrime.com/zerologon-us-behorden-sollen-patch-fur-cve-2020-1472-installieren/ | digitpol_cyber |
2020-09-21 12:00:04 | Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren https://t.co/ltm7pJNUGS https://t.co/otn6L2Epc8 https://j.mp/2RM8Gva | davidkehr |
2020-09-21 10:40:03 | CISA issues rare critical warning to patch systems to apply the August 2020 security update (CVE-2020-1472) for Mic… https://t.co/vlJJgqMtyh https://twitter.com/i/web/status/1307992049120051200 | scottrdavis |
2020-09-21 10:20:03 | Netlogon protokolündeki CVE-2020-1472 güvenlik açığı, diğer adıyla Zerologon, saldırganların Windows alan denetleyi… https://t.co/KZOHOs1gjf https://twitter.com/i/web/status/1307986446532456448 | KasperskyTR |
2020-09-21 10:10:06 | 🔵 ZEROLOGON VULNERABILITY (CVE-2020-1472) The Department of National Security issued the order to patch the vulner… https://t.co/1gk1AYtxnX https://twitter.com/i/web/status/1307983831429984256 | S21sec |
2020-09-21 10:10:03 | The target of the latest emergency directive from the Department of National Security is the CVE-2020-1472 vulnerab… https://t.co/jAAWIehgUu https://twitter.com/i/web/status/1307984699650908168 | S21sec |
2020-09-21 10:00:03 | 🔵ZEROLOGON VULNERABILITY (CVE-2020-1472) The Department of Homeland Security issued the order to patch the vulnerab… https://t.co/tHsYYUwFxG https://twitter.com/i/web/status/1307982178068897792 | S21sec |
2020-09-21 10:00:02 | The target of the latest emergency directive is the CVE-2020-1472 vulnerability, also known as Zerologon. Microsoft… https://t.co/Hh95hsSRZd https://twitter.com/i/web/status/1307982264169619456 | S21sec |
2020-09-21 09:30:04 | @DrIsaPantami @KashifuInuwa @NITDANigeria CVE-2020-1472 just for your info. What does it take to gain access; just attack an employee. | iamTowloo |
2020-09-21 09:20:03 | Affected by #Zerologon (CVE-2020-1472) but unable to apply relevant Windows updates for some reason? @0patch has an… https://t.co/QYBrGMVGyg https://twitter.com/i/web/status/1307971066321604613 | 0patch |
2020-09-21 09:10:07 | @KashifuInuwa @NITDANigeria CVE-2020-1472 just for your info. What does it take to gain access; just attack an employee. | iamTowloo |
2020-09-21 09:10:07 | Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren https://t.co/VCTW1ApNgT http://dlvr.it/Rh2Dkh | AnonNewsDE |
2020-09-21 09:00:05 | Affected by Zerologon (CVE-2020-1472) but unable to apply relevant Windows updates for some reason? @0patch has an… https://t.co/0lRAcIJnLH https://twitter.com/i/web/status/1307966133350395904 | 0patch |
2020-09-21 08:50:05 | CVE-2020-1472 #BlueTeam tip: if patching immediately is impossible, monitor event ID 4662 being triggered multiple… https://t.co/hHzgo33CG1 https://twitter.com/i/web/status/1307963668299218944 | Mal1ekM |
2020-09-21 08:50:04 | Zerologon," CVE-2020-1472 is an elevation of privilege vulnerability affecting multiple Microsoft Windows Server op… https://t.co/wKHmNjj6PP https://twitter.com/i/web/status/1307964370635427842 | argevise |
2020-09-21 08:40:06 | #SecurityAlert: The Zerologon Vulnerability Exploration (CVE-2020-1472) could allow attackers to gain control of a… https://t.co/VlQMcRtSnv https://twitter.com/i/web/status/1307960525171683328 | KedronUK |
2020-09-21 08:40:05 | 'CVE-2020-1472', våbentliggjort med offentlig tilgængelig kode. https://t.co/56qSpR9g2K https://success.trendmicro.com/solution/000270328 | DCIS_SUND |
2020-09-21 08:40:04 | CISA Warning: Patch your Windows Servers against CVE-2020-1472 (Zerologon) https://t.co/5Da4AKud8B #Security… https://t.co/YFCZmTaqlF https://borncity.com/win/?p=16016 https://twitter.com/i/web/status/1307962012559904770 | etguenni |
2020-09-21 08:30:06 | CISA-Warnung: Patcht eure Windows Server gegen CVE-2020-1472 (Zerologon) https://t.co/QjNzwPitL4 #Sicherheit… https://t.co/V6dTs10hxn https://www.borncity.com/blog/2020/09/21/cisa-warnung-patcht-eure-windows-server-gegen-cve-2020-1472-zerologon/ https://twitter.com/i/web/status/1307958610866114565 | etguenni |
2020-09-21 08:20:03 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/iTMWKcEFht https://twitter.com/i/web/status/1307956982918283264 | SophieFouche |
2020-09-21 08:10:02 | Threat Brief: CVE-2020-1472, also known as "Zerologon," was given a "critical" security rating from #Microsoft and… https://t.co/3gAu1170Xn https://twitter.com/i/web/status/1307952712127053824 | JuanMataix |
2020-09-21 07:50:03 | Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren - https://t.co/eP56F3ZK6Z https://t.co/q10niYijXu https://is.gd/4LUOK9 | zdnet_de |
2020-09-21 07:10:03 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/g4mR3MC4dC https://twitter.com/i/web/status/1307939881373569025 | LClefberg |
2020-09-21 07:00:04 | Achtung! Handlungsempfehlung zur kritischen Microsoft Netlogon-Sicherheitslücke CVE-2020-1472 - weitere Infos unter… https://t.co/i58wPMrwsb https://twitter.com/i/web/status/1307937120770764801 | kissystemhaus |
2020-09-21 06:40:02 | A quick post about Zerologon vulnerability (CVE-2020-1472). Patch your Windows domain controllers #Zerologon https://t.co/XClqNEQXhW https://ptrace.net/articles/2020-09/zerologin | d3b4g |
2020-09-21 06:10:10 | Hijacking a Domain Controller with Netlogon RPC (aka Zerologon: CVE-2020-1472) https://t.co/g8sN5CyUoW… https://t.co/4LkG6WEyrz https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hijacking-a-domain-controller-with-netlogon-rpc-aka-zerologon-cve-2020-1472/ https://twitter.com/i/web/status/1307923295543742465 | ptracesecurity |
2020-09-21 05:30:03 | Kiberdrošības pētnieki ir izlaiduši Windows Zerologon CVE-2020-1472 ievainojamības ekspluatējumus, kas ļauj uzbrucē… https://t.co/PPQpCM2igQ https://twitter.com/i/web/status/1307913217293856768 | AntiVirusLV |
2020-09-21 05:20:04 | #Zerologon lets hackers to completely compromise a DC by exploiting the CVE-2020-1472. Roll the patches if it hasn'… https://t.co/VgFc4iNCgf https://twitter.com/i/web/status/1307908268321366016 | ramadji |
2020-09-21 03:20:03 | CVE-2020-1472: El exploit Netlogon que brinda control completo de su sistema Windows a los hackers fácilmente. Parc… https://t.co/1k2g9sqecB https://twitter.com/i/web/status/1307881745816137728 | MDmanfredi |
2020-09-21 03:20:02 | If you patched your DC's for CVE-2020-1472 but didn't apply the Registry subkey, you're STILL vulnerable. HKEY_LO… https://t.co/sXqUOuJDg8 https://twitter.com/i/web/status/1307882105385304065 | aprilmardock |
2020-09-21 01:00:03 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/lB32eN0xtf http://ow.ly/Gje1102n7zU | Sergio_Pilla |
2020-09-21 00:40:03 | Update ASAP - Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 | CISA https://t.co/2fKREzwSOs https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | TheBrothersWISP |
2020-09-20 23:30:03 | #ICYMI Protecting Domain Controllers from CVE-2020-1472 #Zerologon and Other Zero-Day Vulnerabilities… https://t.co/xP9K4XEi83 https://twitter.com/i/web/status/1307821880108228608 | jc_vazquez |
2020-09-20 23:00:03 | CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft re… https://t.co/JyKUz3Al35 https://twitter.com/i/web/status/1307816648498446342 | grant_consultin |
2020-09-20 18:30:07 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-20 18:30:06 | Regla de Snort/Suricata para detectar ataques de tipo Zerologon (CVE-2020-1472) en la red: https://t.co/vxgFRYr3Fs https://gist.githubusercontent.com/silence-is-best/435ddb388f872b1a2e332b6239e9150b/raw/8064d33f62d5983130d3d946aac28ea00aaf6c4a/gistfile1.txt | pcolomes |
2020-09-20 18:20:02 | There's also a snort rule to detect CVE-2020-1472 Zerologon that would be of use to #BlueTeam https://t.co/AT0rwjl47P https://gist.github.com/silence-is-best/435ddb388f872b1a2e332b6239e9150b | ZephrFish |
2020-09-20 17:10:02 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/JaWUzotFOS https://twitter.com/i/web/status/1307727993889009670 | jay_coley |
2020-09-20 16:50:05 | Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/dOnLr7WgFR Via @matthieugarin https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html | PVynckier |
2020-09-20 16:10:03 | Windows Zerologon Vulnerability (CVE-2020-1472) Via: https://t.co/Bny23Ns8Zd Paper: https://t.co/yfxv4cSpIx Arti… https://t.co/0FWxtSZdMo https://twitter.com/wdormann/status/1305564045282598912?ref_src=twsrc%5Etfw https://www.secura.com/pathtoimg.php?id=2055 https://twitter.com/i/web/status/1307713185055739908 | CKsTechNews |
2020-09-20 16:00:02 | CVE-2020-1472, “stems from a flaw in a cryptographic authentication scheme ... which among other things can be used… https://t.co/BsC7JIpPDQ https://twitter.com/i/web/status/1307709228153409538 | benj_fry |
2020-09-20 14:50:03 | Here are some rules to detect CVE-2020-1472 exploitation. #CVE20201472 #zerologon #suricata #suricatarules https://t.co/IPPhsZ3tNy | k1dr3k |
2020-09-20 14:50:03 | Emergency Directive 20-04 https://t.co/3EZHpE8OGx Zerologin(CVE-2020-1472)に関して発令 https://cyber.dhs.gov/ed/20-04/ | nekochanSec555 |
2020-09-20 14:00:03 | Threat Brief: CVE-2020-1472, also known as "Zerologon," was given a "critical" security rating from Microsoft and a… https://t.co/HL6e8J0Bnb https://twitter.com/i/web/status/1307680920799977475 | Candy_Vonk |
2020-09-20 11:40:04 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller… https://t.co/KQvqmbnm5J https://twitter.com/i/web/status/1307643191538200581 | hintz2010 |
2020-09-20 09:30:02 | Detecting CVE-2020-1472 Using Splunk Attack Range #splunkBlogs | netsocialty |
2020-09-20 08:40:03 | CVE-2020-1472 https://t.co/1O0b7MYVdT | filler |
2020-09-20 08:10:04 | Read my Sep 20 'Gestion des Risques/I.E.' Newsletter featuring “Detecting CVE-2020-1472 Using Splunk Attack Range” https://t.co/YE8AOCstRL https://nzzl.us/TDYwH7w | BelinOlivier |
2020-09-20 07:50:09 | CVE-2020-1472 | Netlogon の特権の昇格の脆弱性 https://t.co/kqEIIrWzjg https://t.co/gF9jjvwt74 http://izumino.jp/Security/sec_trend.cgi?ref=tw&ref_date=2020-09-20%2016%3A40 https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2020-1472 | sec_trend |
2020-09-20 07:10:03 | USA emite directiva de emergencia para que los organismos federales respondan a CVE-2020-1472, con fechas límite. ¿… https://t.co/ARWVpIQbOK https://twitter.com/i/web/status/1307575252084502530 | ProtAAPP |
2020-09-20 06:10:02 | Detecting CVE-2020-1472 Using... #Splunk #Microsoft #cyberdefense #cybersecurity https://t.co/VsSq8orvZ5 https://lnkd.in/eiWT6R5 | peterdiaz33 |
2020-09-20 05:30:03 | Sprocket Security - Blog - How to exploit Zerologon (CVE-2020-1472) https://t.co/Qs3FZ7oVKJ https://www.sprocketsecurity.com/blog/how-to-exploit-zerologon | SebydeBV |
2020-09-20 04:20:02 | CVE-2020-1472, as serious as it gets, hence the maximum 10 CVSS rating & the critical severity that Microsoft has a… https://t.co/MqlDgevR6B https://twitter.com/i/web/status/1307534162010677249 | holisticinfosec |
2020-09-20 03:40:03 | All services will be down for about 15 minutes for patches and maintenance to fix CVE-2020-1472, as required by the… https://t.co/b7Bv180GbB https://twitter.com/i/web/status/1307522850140676096 | InnovationInc_ |
2020-09-20 03:40:03 | GitHub Trending Archive, 18 Sep 2020, Python. VoidSec/CVE-2020-1472, bb00/zer0dump, DataSC3/No-BlackM, center-for-t… https://t.co/PW1PJvIBSh https://twitter.com/i/web/status/1307522388704149505 | motakasoft |
2020-09-20 01:10:03 | Did you patch your windows servers already? CVE-2020-1472 https://t.co/GOT77AtMOR https://twitter.com/Forbes/status/1307481190820175880 | naojsamot |
2020-09-20 01:10:03 | Today's #FeaturedPost on https://t.co/o8p81DnL1w "CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow… https://t.co/1jjmxEyelr http://linksfor.dev https://twitter.com/i/web/status/1307486107009863680 | linksfordevs |
2020-09-20 00:40:03 | GitHub Trending Archive, 18 Sep 2020, All. spawnfest/bakeware, SecuraBV/CVE-2020-1472, sdushantha/tmpmail, microsof… https://t.co/wO1M51b0qU https://twitter.com/i/web/status/1307477114279477248 | motakasoft |
2020-09-20 00:30:02 | New Emergency Directive - CVE-2020-1472 affecting Microsoft Windows Netlogon Remote Protocol https://t.co/SmFFZVM0ab https://us-cert.cisa.gov/ncas/current-activity/2020/09/18/cisa-releases-emergency-directive-microsoft-windows-netlogon | CBrustin |
2020-09-19 23:40:02 | Pretty scary Windows Server vulnerability that requires immediate attention. CVE-2020-1472 https://t.co/89Euevvb0v https://www.cisa.gov/blog/2020/09/18/windows-server-vulnerability-requires-immediate-attention | m_simpson |
2020-09-19 20:40:03 | Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/k6AKz0NNjs https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html | Dan_Suciu |
2020-09-19 18:30:06 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-19 17:10:05 | The big news this week is the huge flaw in Microsoft&rsquo;s Active Directory, CVE-2020-1472 (whitepaper). Netlogon… https://t.co/xgLBfvm8oh https://twitter.com/i/web/status/1307363857413763073 | coolartspinner |
2020-09-19 16:30:03 | Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/kblRHR7OPr https://buff.ly/2FRIvRf | pcastagnaro |
2020-09-19 15:10:11 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/8pC9dEJT3H https://twitter.com/i/web/status/1307335174385004544 | deepwatch_sec |
2020-09-19 14:10:02 | Nová Samba řeší CVE-2020-1472 s CVSS 9.8 https://t.co/IWPiGNPvMN http://www.abclinuxu.cz/zpravicky/nova-samba-resi-cve-2020-1472-s-cvss-9.8 | abclinuxu |
2020-09-19 14:00:06 | First stab at a #snort / #suricata rule to match #mimikatz #CVE-2020-1472 #Zerologon using NetrServerAuthenticate2:… https://t.co/yvFP2R9L4y https://twitter.com/i/web/status/1307316396661993474 | James_inthe_box |
2020-09-19 12:30:03 | Wow @CISAgov has issued an emergency alert for CVE-2020-1472 (Windows Netlogon Remote Protocol) there are a several… https://t.co/XByUQzwdmD https://twitter.com/i/web/status/1307294908391268352 | uuallan |
2020-09-19 12:20:03 | Micropatch for #Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/kK25n5AoPh https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html | Anastasis_King |
2020-09-19 10:20:02 | Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/niawjR6Gwk https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html | Secnewsbytes |
2020-09-19 09:50:04 | "Zerologon," CVE-2020-1472 is an elevation of privilege vulnerability affecting multiple Microsoft Windows Server o… https://t.co/1K4eEKEUf0 https://twitter.com/i/web/status/1307253604462596098 | Unit42_Intel |
2020-09-19 09:50:02 | Detecting #CVE-2020-1472 using #Splunk Attack Range https://t.co/OUtzkY4Igw https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html | Steve_rt1 |
2020-09-19 08:50:03 | Instantly become #domain #admin by subverting #Netlogon #cryptography (CVE-2020-1472) https://t.co/FRLnQCVQK2 https://www.secura.com/blog/zero-logon | DrWamala |
2020-09-19 08:10:05 | Detecting CVE-2020-1472 Using #Splunk #Attack #Range #splunkBlogs #CyberSecurity #linux #system #Vulnerability… https://t.co/QVIQtawLJe https://twitter.com/i/web/status/1307228251962699777 | Cobadisec |
2020-09-19 07:00:06 | The DHS has issued an emergency directive requiring, in law, that federal agencies patch CVE-2020-1472 aka Zerologo… https://t.co/7yXSwtunaW https://twitter.com/i/web/status/1307211440751882241 | GossiTheDog |
2020-09-19 07:00:06 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/cMREeHWCsw https://twitter.com/i/web/status/1307211060747870210 | radiceu |
2020-09-19 06:10:05 | CISAがCVE-2020-1472(Netlogon特権昇格の脆弱性)について、緊急司令(Emergency Directive (ED))20-04 を出した。 https://t.co/O2wV341nlS https://us-cert.cisa.gov/ncas/current-activity/2020/09/18/cisa-releases-emergency-directive-microsoft-windows-netlogon | hogehuga |
2020-09-19 06:10:02 | Although Microsoft provided patches for CVE-2020-1472 in August 2020, unpatched systems will be an attractive targe… https://t.co/lwPTw12PjA https://twitter.com/i/web/status/1307199227102138370 | aburassen2 |
2020-09-19 04:20:04 | Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/I2NlOwsNn2 https://t.co/MDOxb7m8mA http://newsbythehour.org/cybr http://bit.ly/3mqxGXa | everythingcybr |
2020-09-19 03:40:07 | GitHub Trending Archive, 17 Sep 2020, Python. VoidSec/CVE-2020-1472, bb00/zer0dump, center-for-threat-informed-defe… https://t.co/x1m5RNHeHo https://twitter.com/i/web/status/1307160001878745088 | motakasoft |
2020-09-19 03:40:06 | GitHub Trending Archive, 17 Sep 2020, Python. davidbau/rewriting, B16f00t/whapa, dirkjanm/CVE-2020-1472, TophantTec… https://t.co/mZUxb9rn6o https://twitter.com/i/web/status/1307160023890419713 | motakasoft |
2020-09-19 03:40:05 | Don’t let an attacker compromise your Active Directory. Protect your operating system from CVE-2020-1472 and read a… https://t.co/YR95DgjucI https://twitter.com/i/web/status/1307160834448199680 | USCERT_gov |
2020-09-19 03:30:04 | Zerologon (CVE-2020-1472) について CISA が緊急指令を出しましたね。。 / CISA Releases Emergency Directive on Microsoft Windows Netlogo… https://t.co/Gs2kZ6caBJ https://twitter.com/i/web/status/1307158538297303041 | masmasjp |
2020-09-19 03:20:11 | Technical details of CVE-2020-1472 Zerologon https://t.co/I2NlOwsNn2 https://t.co/gP6akOE5pE http://newsbythehour.org/cybr http://bit.ly/ | everythingcybr |
2020-09-19 03:20:05 | CVE-2020-1472—affecting Microsoft Windows Netlogon Remote Protocol is critical enough to patch right now for CISA t… https://t.co/q4Fe9x0OvM https://twitter.com/i/web/status/1307156211012231168 | IanBarwise |
2020-09-19 03:10:04 | Don’t let an attacker compromise your Active Directory. Protect your operating system from #CVE-2020-1472 and read… https://t.co/0LhnoVrmo8 https://twitter.com/i/web/status/1307154417712590850 | USCERT_gov |
2020-09-19 02:50:03 | Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/FWX4YJdl0G https://t.co/Q8GREdKGnE http://dlvr.it/Rgw2wJ | grant_bassett |
2020-09-19 02:40:03 | [WARNING| #zerologon (CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE exploit the wil… https://t.co/j9yy5PUCfv https://twitter.com/i/web/status/1307147346359312387 | 3XS0 |
2020-09-19 02:20:03 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/C5ZEoPRlwC by @securabv https://hubs.la/H0wxpz80 | TyrannosaurJen |
2020-09-19 00:40:03 | GitHub Trending Archive, 17 Sep 2020, All. deepklarity/jupyter-text2code, SecuraBV/CVE-2020-1472, microsoft/onefuzz… https://t.co/AVRiBmHCqO https://twitter.com/i/web/status/1307114725256425472 | motakasoft |
2020-09-19 00:20:04 | What an amazing effort 👏 from the team to get these @splunk detections 🛡 out for #Zerologon CVE-2020-1472.… https://t.co/ocMNsvYBK0 https://twitter.com/i/web/status/1307109999005626369 | d1vious |
2020-09-19 00:00:05 | Detecting CVE-2020-1472 (Zerologon) Using Splunk Attack Range #splunkBlogs https://t.co/uvUtFiNZaz #splunk #splunkthreatresearch https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html | rodsoto |
2020-09-18 23:40:04 | “0patch Blog: Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472)” https://t.co/FuxKsq3rah https://htn.to/rjbqqSFyNE | waiha8 |
2020-09-18 21:40:04 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/pdDcxoPIpu https://twitter.com/i/web/status/1307070660938784768 | sdemarzio75 |
2020-09-18 20:40:03 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/9hTCcYuBaV https://twitter.com/i/web/status/1307056031814516736 | Eddiecarvallo |
2020-09-18 20:30:06 | CVE-2020-1472 hakkında teknik bir makale yayınladı ve zafiyet “Zerologon” olarak isimlendirildi. Windows sunucuları… https://t.co/nLVAleZieb https://twitter.com/i/web/status/1307052207683055621 | teknokizilelma |
2020-09-18 20:20:03 | CVE-2020-1472 hakkında teknik bir makale yayınladı ve zafiyet “Zerologon” olarak isimlendirildi. #microsoft… https://t.co/mYWxaM3fs2 https://twitter.com/i/web/status/1307050635590799362 | yakupcontarli |
2020-09-18 20:00:03 | #CVE20201472 just coz i wanna be in someone's CTI feed :P #CVE-2020-1472 CVE-2020-1472 https://t.co/PQ43ISbkjm | UK_Daniel_Card |
2020-09-18 19:40:05 | Are all your DCs already patched against Zerologn (CVE-2020-1472)? Check out this simplified overview of the critic… https://t.co/OFtqsPLvkV https://twitter.com/i/web/status/1307039350476214277 | simakov_marina |
2020-09-18 18:50:16 | ZeroLogon Attack [CVE-2020-1472] for Red and Blue Team. Perform Purple Teaming activity by Simulating & Detecting… https://t.co/PAf5pvJrI4 https://twitter.com/i/web/status/1307027710770724864 | cyberwarfarelab |
2020-09-18 18:30:07 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-18 18:10:03 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/MnzQJJecWh https://twitter.com/i/web/status/1307018281094651905 | deepwatch_sec |
2020-09-18 17:50:03 | CVE-2020-1472, a vulnerability affecting Microsoft Windows Netlogon Remote Protocol. #Anonymous… https://t.co/kJGbpJK7Pa https://twitter.com/i/web/status/1307013528952471557 | AnonAnonymous |
2020-09-18 17:50:03 | Zerologon Proof of Concept Code Available for CVE-2020-1472 (Windows Netlogon Elevation of Privilege):… https://t.co/xK3I6w9NXn https://twitter.com/i/web/status/1307013481397448706 | FortiGuardLabs |
2020-09-18 17:30:07 | Here we are with #zerologon / CVE-2020-1472, now: Challenge / Response / Password and even result codes are encrypt… https://t.co/reytT1PqYA https://twitter.com/i/web/status/1307007546167787523 | gentilkiwi |
2020-09-18 17:20:02 | Critical Vulnerabilities in Microsoft Windows Netlogon Remote Protocol (MS-NRPC) CVE-2020-1472. See the… https://t.co/NsGquXCumK https://twitter.com/i/web/status/1307005915162443777 | ncsc_gov_ie |
2020-09-18 16:50:24 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/1dR14UfyYt https://twitter.com/i/web/status/1306997407469707265 | jzupon |
2020-09-18 16:40:04 | #fridayreads #blogging Patch alert! With a CVSS score of 10, Zerologon (CVE-2020-1472) is one of the most critical… https://t.co/YmiSv6V38S https://twitter.com/i/web/status/1306994760712814593 | preemptsecurity |
2020-09-18 16:00:04 | Threat Brief: Microsoft Vulnerability CVE-2020-1472 “Zerologon” https://t.co/b8p1lqhZSZ https://unit42.paloaltonetworks.com/zerologon/ | PVynckier |
2020-09-18 15:50:25 | A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/gyxHEjeUEc https://twitter.com/i/web/status/1306981559677919234 | joymedellin |
2020-09-18 15:40:03 | La détection de la CVE-2020-1472 (#Zerologon) a été ajouté à la box #Sherlock. Ça passe bientôt en prod chez nos cl… https://t.co/t1qSQpndQj https://twitter.com/i/web/status/1306979353864142855 | Prohacktiv3 |
2020-09-18 15:40:02 | Just added a PR on ade (ActiveDirectoryEnum) that adds imbedded exploits to the mix. First one is CVE-2020-1472 tes… https://t.co/v7b6iIpPTb https://twitter.com/i/web/status/1306980512095821824 | CasperGN |
2020-09-18 15:30:03 | Vulnerabilidad crítica de escalación de privilegios sobre NetLogon (MS-NRPC) CVE-2020-1472 #ciberseguridad… https://t.co/BqmOc4ugqs https://twitter.com/i/web/status/1306978677473902592 | soc_datasec |
2020-09-18 15:10:04 | CVE-2020-1472 is a new exploit nicknamed 'Zerologon', which exists in Windows' Netlogon that could allow attackers… https://t.co/IAcKYfkVue https://twitter.com/i/web/status/1306971501627953154 | AtlasCybersec |
2020-09-18 14:50:16 | Want verify patches for CVE-2020-1472 have been applied to your DC's? Run: get-hotfix -id KB4571702 -ComputerNam… https://t.co/X8lggvaeLU https://twitter.com/i/web/status/1306966640450510852 | XSSinar |
2020-09-18 14:50:15 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/m41r1OLuJJ https://www.secura.com/blog/zero-logon | timyardley |
2020-09-18 14:40:05 | CVE-2020-1472 - MS Netlogon - Parchar lo antes posible!!! https://t.co/7J23rvhrrD @puntonetsol #cve https://us-cert.cisa.gov/ncas/current-activity/2020/09/17/certcc-releases-information-critical-vulnerability-microsoft | egdutra |
2020-09-18 14:00:04 | 'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/HamkpWHnXy https://twitter.com/i/web/status/1306954552722092032 | Art_Capella |
2020-09-18 14:00:03 | 'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/Ld0SI9vHzP https://twitter.com/i/web/status/1306954943266304000 | Art_Capella |
2020-09-18 13:40:07 | CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @JennaMagius developed one of the first publicl… https://t.co/uE2qnwtUAi https://twitter.com/i/web/status/1306948667564326912 | RiskSense |
2020-09-18 13:20:02 | Things like #CVE-2020-1472 are what keep me passionate about my career in #Cybersecurity. https://t.co/epW0ACIBe9 https://www.secura.com/pathtoimg.php?id=2055 | jasonhillva |
2020-09-18 12:00:08 | Detect vulnerable Netlogon connections (event id 5829) , indicates possible CVE-2020-1472 / #Zerologon attempts… https://t.co/tdGvWkssl7 https://twitter.com/i/web/status/1306924410213892097 | cudeso |
2020-09-18 11:40:06 | La #vulnerabilidad CVE-2020-1472 amenaza a los controladores de dominio https://t.co/eEtdyubkCW #Zerologon https://t.co/lau5r5myb5 https://kas.pr/qdc2 | KasperskyES |
2020-09-18 10:20:03 | 0patch Blog: Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/8iXAUoENgq https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html | tais9 |
2020-09-18 09:30:07 | Micropatch for #Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/kK25n5AoPh https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html | Anastasis_King |
2020-09-18 09:30:05 | CVE-2020-1472 ZeroLogon Remote Code Execution. 🔥 https://t.co/KCYRofzfAe https://t.co/FHXpYuPSbH https://t.co/PZxFgNuat7 https://github.com/dirkjanm/CVE-2020-1472 https://www.secura.com/blog/zero-logon https://twitter.com/vFeed_IO/status/1305535281655885825 | sec715 |
2020-09-18 09:30:04 | เดี๋ยวลงยาว ๆ อีกที มี Hacker พบและใช้งานช่องโหว่ Netlogon (CVE-2020-1472) ส่งผลให้ Linux Samba 4.8 ลง ไป และ Windo… https://t.co/GWHe4YWeif https://twitter.com/i/web/status/1306887578642083840 | mungship |
2020-09-18 09:30:03 | ⚠️Alerte CERT-FR⚠️ Samba configuré comme contrôleur de domaine est également vulnérable à CVE-2020-1472 CERTFR-202… https://t.co/VeV9dwkHrs https://twitter.com/i/web/status/1306888189215420417 | CERT_FR |
2020-09-18 08:50:03 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/ZT2oPtD7Uw https://www.secura.com/blog/zero-logon | Secnewsbytes |
2020-09-18 08:20:04 | #Qualys warnt vor kritischer Schwachstelle CVE-2020-1472 aka #ZeroLogon https://t.co/qmvA3U4eTa https://www.infopoint-security.de/?p=24934 | ip4security |
2020-09-18 08:10:03 | Netlogon’da Kritik Zafiyet: #Zerologon! CVE-2020-1472 kodlu zafiyet, Netlogon’un belirli bir fonksiyonundaki doğrul… https://t.co/uzMlBBvWjF https://twitter.com/i/web/status/1306867749126311936 | Priviasec |
2020-09-18 07:40:14 | CVE-2020-1472 Zerologon as a Beacon Object File https://t.co/qq46MDJfLm via @YouTube https://youtu.be/zGf1Rat3rEk | lo0_ro |
2020-09-18 07:00:05 | Threat Brief: Microsoft Vulnerability CVE-2020-1472 “Zerologon” https://t.co/AfOiNtb8j6 http://sco.lt/7hemZ6 | DidierCaradec |
2020-09-18 06:30:05 | 2020年8月にMicrosoftが公開したセキュリティ更新プログラムCVE-2020-1472 Netlogonにおける特権昇格脆弱性の脅威概要を公開しました。 #Zerologon とも呼ばれる本脆弱性のCVSSスコアは10… https://t.co/PI2t1hlKew https://twitter.com/i/web/status/1306840975747223552 | unit42_jp |
2020-09-18 06:10:03 | Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/V8VUAVyuXi https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html | Dinosn |
2020-09-18 05:40:05 | US-CERTの9/14注意喚起(CVE-2020-1472)。Netlogonの攻撃コードが出回ってます。 「Windows ServerのNetlogon Remoteプロトコルの実装で、MS-NRPCを使用してドメインコン… https://t.co/NsXAh2QhQ2 https://twitter.com/i/web/status/1306827814566592514 | foxbook |
2020-09-18 05:40:03 | CVE-2020-1472 #ZeroLogon can be a nightmare for organizations. Specially in #Ransomware era #CyberSecurity | jawadkhalil1 |
2020-09-18 05:00:03 | 2020年1月14日にサポートが終了したWindows Server 2008および2008 R2にZerologon(CVE-2020-1472)のパッチが適用できるようだけどPROライセンスが必要。 25.95 USD +ta… https://t.co/KjHzcPw7jf https://twitter.com/i/web/status/1306819164800077829 | RootLinks_Co |
2020-09-18 04:30:04 | publicly available exploit code for CVE-2020-1472 📌elevation of privilege vulnerability in $MSFT Netlogon 📌unpatche… https://t.co/MfYXN5eKK8 https://twitter.com/i/web/status/1306812355590971392 | QContrarian |
2020-09-18 04:30:03 | Just did an exploit for #zerologin CVE-2020-1472 and a pass-the-hash attack on a W2016 DC using Impacket. Song: Th… https://t.co/K5kbGW2co3 https://twitter.com/i/web/status/1306812458737098752 | THE_PALE_KALE |
2020-09-18 03:40:06 | GitHub Trending Archive, 16 Sep 2020, Python. SecuraBV/CVE-2020-1472, yanshengjia/ml-road, xingyizhou/CenterTrack,… https://t.co/5zoUZqjozM https://twitter.com/i/web/status/1306797634867191808 | motakasoft |
2020-09-18 03:10:03 | Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/L7GjJsCbTT https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html?m=1 | yeroncio |
2020-09-18 02:00:09 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/uz1TtpOSe2 https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | se_kenchan |
2020-09-18 01:20:06 | CVE-2020-1472 usefull exploit (more than a POC) publicly available. Did you patch yet? | TristanDostaler |
2020-09-18 01:20:05 | ช่องโหว่ CVE-2020-1472 ได้รับ CVSS score อยู่ที่ 10/10 ผลกระทบ: เพิ่มสิทธิ์ของ user ที่อยู่ในเครือข่ายของ Domain… https://t.co/M7Q7wGadN6 https://twitter.com/i/web/status/1306763843394101248 | AwayA2u |
2020-09-18 01:20:04 | » CVE-2020-1472:ドメインコントローラーを脅かす脆弱性 | カスペルスキー公式ブログ https://t.co/VIAww469fB https://blog.kaspersky.co.jp/cve-2020-1472-domain-controller-vulnerability/29235/ | yuuyuyu_ka |
2020-09-18 01:20:02 | 脅威に関する情報: マイクロソフトの脆弱性CVE-2020-1472「Zerologon」 https://t.co/S49g7hCZLb https://unit42.paloaltonetworks.jp/zerologon/ | fd0 |
2020-09-18 01:10:03 | ICYMI: Details on the impact of the Zerologon Vulnerability Exploration (CVE-2020-1472), how it works, and how to p… https://t.co/RivVnu8VcK https://twitter.com/i/web/status/1306762113159962625 | ExtraHop |
2020-09-18 00:50:08 | A proof of concept exploit has been released for Windows Netlogon vulnerability CVE-2020-1472. We expect it to be u… https://t.co/xiC0b9v19H https://twitter.com/i/web/status/1306756076310855680 | NSACyber |
2020-09-18 00:40:05 | Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/pEF7Yow9tt @jpcert https://www.jpcert.or.jp/newsflash/2020091601.html | r1ngo5656 |
2020-09-18 00:20:05 | https://t.co/92jroITjht From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472) - You are being redirected.. https://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ | 1nf0s3cpt |
2020-09-18 00:20:04 | 2020年8月にMicrosoftが公開したセキュリティ更新プログラムCVE-2020-1472 Netlogonにおける特権昇格脆弱性の脅威概要を公開しました。 Zerologonとも呼ばれる本脆弱性のCVSSスコアは10.0… https://t.co/lXUC2c71GR https://twitter.com/i/web/status/1306748713356980224 | kimidori_sec |
2020-09-17 23:50:07 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/ifXKuDVnOT https://m.cje.io/3c6GigP | caseyjohnellis |
2020-09-17 23:10:04 | 0patch fixt Zerologon (CVE-2020-1472) in Windows Server 2008 R2 https://t.co/4x4E4Db6A2 #0patch #Sicherheit… https://t.co/7kdsLqIQ4A https://www.borncity.com/blog/2020/09/18/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2/ https://twitter.com/i/web/status/1306729903686025216 | etguenni |
2020-09-17 23:10:02 | 0patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2 https://t.co/YRM5WPjqPh #0patch… https://t.co/YI8L0pajNN https://borncity.com/win/?p=15977 https://twitter.com/i/web/status/1306731889961717760 | etguenni |
2020-09-17 23:00:04 | Threat Brief: CVE-2020-1472, also known as "Zerologon," was given a "critical" security rating from Microsoft and a… https://t.co/iChlwGQ0sa https://twitter.com/i/web/status/1306728148629893120 | Unit42_Intel |
2020-09-17 22:40:04 | From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472) - Lares https://t.co/HnD648GDuH http://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ | Dan_Suciu |
2020-09-17 22:20:05 | The Zerologon Windows domain controller vulnerability (CVE-2020-1472) is dangerous… but Trend Micro’s customers are… https://t.co/dXRdiwzPoq https://twitter.com/i/web/status/1306718561851842561 | EricSkinner |
2020-09-17 22:20:03 | For a terse summary of the Windows Server Netlogon vulnerability (CVE-2020-1472) exposed this month, and how it wor… https://t.co/m8kce6iQm2 https://twitter.com/i/web/status/1306719279476125696 | kurmac |
2020-09-17 22:00:08 | (CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE have been looking into this very nas… https://t.co/nHgfFPIu5V https://twitter.com/i/web/status/1306712191467270144 | EthanGray___ |
2020-09-17 21:50:03 | マジか、 Zerologon (CVE-2020-1472) は Samba 4.7 以前にも影響があるって・・! https://t.co/OGZ6DckCDK https://twitter.com/wdormann/status/1305908429664419840 | rough_and_cheap |
2020-09-17 21:50:03 | (CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE have been looking into this very nas… https://t.co/M4IL6zNmRt https://twitter.com/i/web/status/1306711832132857856 | EthanGray___ |
2020-09-17 21:50:02 | New post: Threat Brief: Microsoft Vulnerability CVE-2020-1472 “Zerologon” https://t.co/hq3TtMuvS1 https://reportcybercrime.com/threat-brief-microsoft-vulnerability-cve-2020-1472-zerologon/ | digitpol_cyber |
2020-09-17 21:40:07 | ZeroLogon - Owning HTB machines with CVE-2020-1472 https://t.co/8qgNCcnmks https://0xdf.gitlab.io/2020/09/17/zerologon-owning-htb-machines-with-cve-2020-1472.html | hackplayers |
2020-09-17 21:40:05 | Threat Brief: Microsoft Vulnerability CVE-2020-1472 “Zerologon” https://t.co/x2HbXvF9pz #CVE20201472 #vulnerability… https://t.co/Y3SaCYz7Za http://dlvr.it/RgqgLH https://twitter.com/i/web/status/1306708271231688704 | blueteamsec1 |
2020-09-17 21:30:05 | CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/pT7SisAHea https://twitter.com/i/web/status/1306705399123341312 | RiskSense |
2020-09-17 21:10:03 | #microsoft | #microsoftsecurity | Microsoft Netlogon Elevation of Privilege Vulnerability [CVE-2020-1472] https://t.co/nS6DgoamCq https://nationalcybersecuritynews.today/microsoft-microsoftsecurity-microsoft-netlogon-elevation-of-privilege-vulnerability-cve-2020-1472/ | NcsVentures |
2020-09-17 20:50:03 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/zFZPRrc2f8 https://twitter.com/i/web/status/1306696214663041024 | deepwatch_sec |
2020-09-17 20:30:07 | Microsoft Netlogon Elevation of Privilege Vulnerability [CVE-2020-1472] https://t.co/2ELfnxc346 https://www.systemtek.co.uk/2020/09/microsoft-netlogon-elevation-of-privilege-vulnerability-cve-2020-1472/ | 6townstechteam |
2020-09-17 20:30:07 | Microsoft Netlogon Elevation of Privilege Vulnerability [CVE-2020-1472] https://t.co/F493yLbbHo https://www.systemtek.co.uk/2020/09/microsoft-netlogon-elevation-of-privilege-vulnerability-cve-2020-1472/ | SystemTek_UK |
2020-09-17 20:30:06 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/4HWJMyMFE7 https://lnkd.in/dyTHHWT | massilanzi |
2020-09-17 20:30:04 | Critical #vulnerability #Zerologon, CVE-2020-1472, with severity score of 10 was fixed by #Microsoft last month.… https://t.co/42EYlyrCg1 https://twitter.com/i/web/status/1306690884617019398 | SecPod |
2020-09-17 20:20:06 | Micropatch for Zerologon (CVE-2020-1472) https://t.co/uLvuztxrO8 #appsec #security #secops https://ift.tt/2ZMOT36 | rtcz_io |
2020-09-17 20:20:05 | ¿qué es #Zerologon? #CVE-2020-1472 es resultado de un defecto en el esquema de autentificación criptográfico del p… https://t.co/bilI1BBNRl https://twitter.com/i/web/status/1306687549759520768 | grevelo1 |
2020-09-17 20:20:04 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/c46gpNjXVz #CERT #CyberSecurity #InfoSec #SOC #TousSecNum https://bit.ly/2RzY822 | cyberdian_cert |
2020-09-17 20:20:04 | ¿Quién es vulnerable? El CVE-2020-1472 supone un riesgo para las empresas cuyas redes están basadas en los controla… https://t.co/TxHnlcRqg0 https://twitter.com/i/web/status/1306687558525554688 | grevelo1 |
2020-09-17 20:10:06 | Are you protected from #Zerologon (CVE-2020-1472) attacks? https://t.co/2M19py6Z1E https://t.co/LfeiZTl3NC https://hubs.la/H0wtY5_0 | CoreSecurity |
2020-09-17 20:10:06 | #Microsoft's patch for the CVE-2020-1472 vulnerability in the Netlogon protocol aka Zerologon is an update you shou… https://t.co/7np22Yd0sW https://twitter.com/i/web/status/1306684615197892615 | kaspersky |
2020-09-17 20:10:04 | What does the #Zerologon (CVE-2020-1472) attack look like? Core Security's Raphael Mudge demonstrates with our Coba… https://t.co/pZZOm3RPq0 https://twitter.com/i/web/status/1306685831831265280 | CoreSecurity |
2020-09-17 19:30:05 | Here is a #PowerShell implementation of #ZeroLogon (CVE-2020-1472) since everyone else has released POCs. This is a… https://t.co/7erHXxt4CH https://twitter.com/i/web/status/1306675527080718339 | techlazy_msft |
2020-09-17 19:10:05 | Adversaries love Cobalt Strike. More on CVE-2020-1472 here: https://t.co/iPRvMscFO5 https://blog.cobaltstrike.com/2020/09/17/beacon-object-file-adventures-some-zerologon-smbghost-and-situational-awareness/ | brgarnett |
2020-09-17 18:50:22 | There seems to be quite some questions and confusion about the impact of exploiting Zerologon (CVE-2020-1472) on th… https://t.co/UI8X4hGPGX https://twitter.com/i/web/status/1306665053299634176 | argevise |
2020-09-17 18:40:13 | Micropatch for Zerologon (CVE-2020-1472) https://t.co/Xqd9uA3awy http://hrbt.us/212690 | hardreboot |
2020-09-17 18:40:12 | CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/rhoqw8PsFw https://twitter.com/i/web/status/1306661816563650560 | RiskSense |
2020-09-17 18:30:10 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-17 18:30:10 | ⚡️#0patchTeam📢 Micropatch for #Zerologon, the "perfect" 🪟Windows vulnerability (CVE-2020-1472)👉… https://t.co/sjjnJ218QS https://twitter.com/i/web/status/1306659932046069760 | WZorNET |
2020-09-17 18:30:09 | CVE-2020-1472 | Vulnerabilidad de elevación de privilegios de Netlogon. Un atacante no autenticado podría aprovecha… https://t.co/moRvLytDmt https://twitter.com/i/web/status/1306660189291114496 | veronicabp_ |
2020-09-17 18:30:07 | Más sobre cómo detectar la explotación de ZeroLogon (CVE-2020-1472). https://t.co/UEjNaCb5tu http://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ | ProtAAPP |
2020-09-17 18:30:03 | CERT/CC Releases Information on Critical Vulnerability in Microsoft Windows Netlogon Remote Protocol CVE-2020-1472… https://t.co/4mz1SYilBT https://twitter.com/i/web/status/1306661438124036096 | z3roTrust |
2020-09-17 18:20:05 | ⚠️Researchers have released exploits for the Windows #Zerologon CVE-2020-1472 #vulnerability that allow an attacker… https://t.co/v0EJj4axRV https://twitter.com/i/web/status/1306657175847215109 | InferSight |
2020-09-17 18:00:09 | New post: "Micropatch for Zerologon (CVE-2020-1472)" https://t.co/Pui2dfByqj https://ift.tt/3iJv2t9 | Myinfosecfeed |
2020-09-17 18:00:04 | Zerologon (CVE-2020-1472,) – hacking Windows servers with a bunch of zeros Info: - Already patched with Aug. updat… https://t.co/UXviuBclrZ https://twitter.com/i/web/status/1306653578745053184 | CKsTechNews |
2020-09-17 18:00:03 | Micropatch for Zerologon (CVE-2020-1472) https://t.co/1GG18i6FKd https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html | _r_netsec |
2020-09-17 17:50:14 | CVE-2020-1472, or #Zerologon, is a great example of the value of virtual patching featured in our products. Here's… https://t.co/QuoEriKAQc https://twitter.com/i/web/status/1306649741195960321 | TrendMicro |
2020-09-17 17:50:13 | Check out CERT/CC’s latest Vuln. Note for information on CVE-2020-1472, a vulnerability in Microsoft’s Netlogon. An… https://t.co/ALavHOE2ME https://twitter.com/i/web/status/1306649744316477443 | USCERT_gov |
2020-09-17 17:50:10 | 'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/UxDHcjDgkx https://twitter.com/i/web/status/1306650390700589056 | lizbeth_plaza |
2020-09-17 17:50:08 | CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft re… https://t.co/FHMC5URsAk https://twitter.com/i/web/status/1306650549119406080 | lizbeth_plaza |
2020-09-17 17:40:02 | For those interested in how Microsoft fixed CVE-2020-1472 ("Zerologon") https://t.co/HPHnGmfsaj https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html | mkolsek |
2020-09-17 17:30:05 | If you have set up detections for #zerologon (CVE-2020-1472), don't forget that it could also be exploited over SMB… https://t.co/FAwNILtQ1K https://twitter.com/i/web/status/1306644600258523137 | ZeroNetworks |
2020-09-17 17:20:05 | Running a Windows Server that is vulnerable to CVE-2020-1472 ("Zerologon") but cannot apply the official update for… https://t.co/i46C2J7fzv https://twitter.com/i/web/status/1306643364666847233 | 0patch |
2020-09-17 17:10:05 | We've just issued a micropatch for CVE-2020-1472 ("Zerologon") for Windows Server 2008 R2 without Extended Security… https://t.co/Jop3oh5lFE https://twitter.com/i/web/status/1306641013340069890 | 0patch |
2020-09-17 17:00:11 | New blog post! 🐀 | Sentinel Query: Detect ZeroLogon (CVE-2020-1472) #sentinel #hunting #CVE20201472 #kusto… https://t.co/Hfzo9nWDUs https://twitter.com/i/web/status/1306637606202073088 | NVISO_Labs |
2020-09-17 17:00:05 | This is a great article on detecting ZeroLogon (CVE-2020-1472) activity https://t.co/TFNFx1Agxs https://twitter.com/indi303/status/1306615934614794240 | PyroTek3 |
2020-09-17 16:40:11 | Microsoft’s August Patch Tuesday releases contained a patch for CVE-2020-1472 which can be exploited by attackers t… https://t.co/lhuGgf8Mhp https://twitter.com/i/web/status/1306632556838871043 | aburassen2 |
2020-09-17 16:30:11 | Samba est vulnérable à #ZeroLogon / CVE-2020-1472 et personne n'a pensé à les prévenir 😂 #0day https://t.co/12ogN6NLWP https://www.openwall.com/lists/oss-security/2020/09/17/2 | newsoft |
2020-09-17 16:30:03 | Exploit code for Windows Zerologon CVE-2020-1472 released; your Windows server is at risk https://t.co/aBI6XiIRfp https://androidrookies.com/exploit-code-for-windows-zerologon-cve-2020-1472-released-your-windows-server-is-at-risk/ | comboupdates |
2020-09-17 16:00:08 | Sentinel Query: Detect ZeroLogon (CVE-2020-1472) https://t.co/YHTAwCn0IX https://blog.nviso.eu/2020/09/17/sentinel-query-detect-zerologon-cve-2020-1472/ | Dinosn |
2020-09-17 16:00:07 | Infosec teams the world over are panicking about CVE-2020-1472. I’m pretty sure even in orgs with a robust patch st… https://t.co/CjS2KOVQMG https://twitter.com/i/web/status/1306622131581587456 | miketheitguy |
2020-09-17 15:50:08 | Jos ette ole vielä hoitaneet asiaa kuntoon: Zerologon (CVE-2020-1472) on haavoittuvuus joka mahdollistaa domain con… https://t.co/0u4qcJhLth https://twitter.com/i/web/status/1306618939229732865 | LeijonaSecurity |
2020-09-17 15:30:04 | Detecting ZeroLogon CVE-2020-1472 by our inhouse detection beast @Antonlovesdnb https://t.co/2rflNHMThw Including… https://t.co/lyvWBz9HBh https://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ https://twitter.com/i/web/status/1306615934614794240 | indi303 |
2020-09-17 15:10:07 | Why is the #Microsoft CVE-2020-1472 #vulnerability, known as #Zerologon, so dangerous for #enterprise #security net… https://t.co/fG1A7fKB13 https://twitter.com/i/web/status/1306608879594287109 | securitymag |
2020-09-17 15:10:06 | New Post: Defensive Guidance for ZeroLogon (CVE-2020-1472) - https://t.co/iY0k3T76ap Including some Splunk, Sysmon… https://t.co/5A1OTZBbns https://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ https://twitter.com/i/web/status/1306609657797062656 | Antonlovesdnb |
2020-09-17 15:10:04 | New on the Lares blog - From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472): https://t.co/v6ReOb9ycs https://buff.ly/2RAm2dZ | andrewsmhay |
2020-09-17 15:10:04 | New on the Lares blog - From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472): https://t.co/CHVPXxt3nE https://buff.ly/2ZOlndn | Lares_ |
2020-09-17 15:00:04 | New on the Lares blog - From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472): https://t.co/kZOpVe4sUL https://buff.ly/33Bi6zk | RisingCyberLLC |
2020-09-17 14:50:05 | ⚠️Researchers have released exploits for the Windows #Zerologon CVE-2020-1472 #vulnerability that allow an attacker… https://t.co/LRbVjmTuQu https://twitter.com/i/web/status/1306605110831837184 | ptrancyber |
2020-09-17 14:50:02 | CVE-2020-1472 After setting network pass with NetrServerPasswordSet2, event id 4742 can be generated with Anonymou… https://t.co/TtKwts2Mnu https://twitter.com/i/web/status/1306606229721145344 | huntingneo |
2020-09-17 14:40:13 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/3DIHq9gdsk https://www.secura.com/blog/zero-logon | walfridolopez |
2020-09-17 14:40:09 | ZeroLogon (CVE-2020-1472) testing script https://t.co/BdMek0Khfa https://github.com/SecuraBV/CVE-2020-1472 | walfridolopez |
2020-09-17 14:30:06 | Identificada como CVE-2020-1472, la falla recibió un alto puntaje según Microsoft. #hacking #Microsoft… https://t.co/ssQETM1JeT https://twitter.com/i/web/status/1306599359329562624 | EHCGroup |
2020-09-17 14:10:05 | Ya está disponible en YouTube nuestro vídeo acerca de #Zerologon CVE-2020-1472 en el cual comentamos un poco en qué… https://t.co/hYTLFgUJVY https://twitter.com/i/web/status/1306594939074035715 | edsitrendES |
2020-09-17 13:50:09 | Samba and CVE-2020-1472 ("Zerologon"): Posted by Douglas Bagnall on Sep 17In August, Microsoft patched CVE-2020-147… https://t.co/VEZd6i4XL9 https://twitter.com/i/web/status/1306589734295101447 | oss_security |
2020-09-17 13:30:04 | Detectando la explotación de ZeroLogon (CVE-2020-1472). https://t.co/U3oevozFIt https://twitter.com/joshlemon/status/1306487256480460805 | ProtAAPP |
2020-09-17 13:20:05 | Instantly elevate to Domain Admin with this dirkjanm/CVE-2020-1472 https://t.co/A2wwQ3SnD9 https://buff.ly/2E7y4Z5 | safepassme |
2020-09-17 13:20:04 | Hey defenders... CVE-2020-1472/Zerologon decoy now available on PreSploit! https://t.co/5wpAt2L3Bn https://t.co/hfXiBSXQ9m http://avesnetsec.com | SimoKohonen |
2020-09-17 12:50:07 | #RT @NakedSecurity: ❗Zerologon, a.k.a CVE-2020-1472, is the big, bad bug of the week❗ Zerologon is well named - th… https://t.co/jO1mCi7IB5 https://twitter.com/i/web/status/1306573964500664320 | Ash_Dax |
2020-09-17 12:30:04 | ❗Zerologon, a.k.a CVE-2020-1472, is the big, bad bug of the week❗ Zerologon is well named - the bug means an attac… https://t.co/qwRdeZCmVi https://twitter.com/i/web/status/1306570901752811522 | NakedSecurity |
2020-09-17 12:30:03 | CVE-2020-1472の件、影響しそうな範囲が広大で地味に効く😥 特にSambaとアプライアンス製品あたりがどうかなと。GroupPolicyで無効化しないに越したことはないので調査がね... | Cryshii |
2020-09-17 12:20:04 | ⚠️Researchers have released exploits for the Windows #Zerologon CVE-2020-1472 #vulnerability that allow an attacker… https://t.co/7QS3HWPsdV https://twitter.com/i/web/status/1306567909494358018 | S3ConsultingLLC |
2020-09-17 12:00:03 | Here is a #PowerShell implementation of #ZeroLogon (CVE-2020-1472) since everyone else has released POCs. This is a… https://t.co/3uaYI9u4RL https://twitter.com/i/web/status/1306563557186768896 | BCSecurity1 |
2020-09-17 11:40:05 | Neuigkeiten über die im August bekannt gewordene kritische Sicherheitslücke CVE-2020-1472, die jetzt als „Zerologon… https://t.co/clqB9IGqHh https://twitter.com/i/web/status/1306557475160809473 | SuresecureD |
2020-09-17 11:20:03 | Sentinel Query: Detect ZeroLogon (CVE-2020-1472) https://t.co/ifsNUxV83i https://blog.nviso.eu/2020/09/17/sentinel-query-detect-zerologon-cve-2020-1472/ | _BlackB0x_ |
2020-09-17 11:10:07 | Detecting Zerologon (CVE-2020-1472) with Zeek: By Yacin Nadji, Corelight Security Researcher CVE-2020-1472 aka Zero… https://t.co/nDO9E2W1aF https://twitter.com/i/web/status/1306549223240867840 | cipherstorm |
2020-09-17 11:00:04 | The second round of patches for Microsoft's #CVE-2020-1472 are coming in February 2021. Learn how to keep your netw… https://t.co/pNkdHNwWrb https://twitter.com/i/web/status/1306546781317148678 | VerSprite |
2020-09-17 10:50:04 | CVE-2020-1472: El exploit de Netlogon que brinda control completo de su sistema Windows a los hackers fácilmente. P… https://t.co/MDOCp1qDA9 https://twitter.com/i/web/status/1306545065645559809 | NormanOre |
2020-09-17 10:30:06 | Zerologon (CVE-2020-1472)やっと試せた。まじであっさり刺さる。フォレンジック的には、デフォルトの設定でセキュリテイベントログにイベントID4742で、匿名ログオンでコンピュータアカウントが変更されたログが残… https://t.co/WvsT3pOGt3 https://twitter.com/i/web/status/1306538440498974721 | fire_fire_2 |
2020-09-17 10:10:05 | NVISO Labs | Sentinel Query: Detect ZeroLogon (CVE-2020-1472) https://t.co/8EtBoGrw6g https://bit.ly/3ceacj9 | StopMalvertisin |
2020-09-17 10:10:04 | CVE-2020-1472, Exploit Demo https://t.co/ALrh2rwR7W https://nv2lt.github.io/windows/CVE-2020-1472-Step-by-Step-Procedure/ | k_nu11r00t |
2020-09-17 10:10:04 | CVE-2020-1472 - Exploit Code for CVE-2020-1472 aka Zerologon https://t.co/2uLLOyFBQN via @pythontrending https://github.com/VoidSec/CVE-2020-1472 | argevise |
2020-09-17 09:30:04 | New post: PoC dla podatności Zerologon (CVE-2020-1472) na Microsoft — CERT PSE https://t.co/7FLPGMqi3B https://reportcybercrime.com/poc-dla-podatnosci-zerologon-cve-2020-1472-na-microsoft-cert-pse/ | digitpol_cyber |
2020-09-17 09:10:06 | CVE-2020-1472:ドメインコントローラーを脅かす脆弱性 | カスペルスキー公式ブログ https://t.co/tVSToIivHW https://blog.kaspersky.co.jp/cve-2020-1472-domain-controller-vulnerability/29235/ | ohhara_shiojiri |
2020-09-17 09:00:04 | PoC dla podatności Zerologon (CVE-2020-1472) na Microsoft https://t.co/Wym4NHCYh6 https://cert.pse-online.pl/poc-dla-podatnosci-zerologon-cve-2020-1472-na-microsoft/ | CERTPSE |
2020-09-17 08:50:05 | #zerologon CVE-2020-1472 from @SecuraBV is yet another DC smashing attack. There will always be zero days, but the… https://t.co/Tp8CzI25DT https://twitter.com/i/web/status/1306513570419617792 | SagieSec |
2020-09-17 08:40:06 | A new #mimikatz 🥝release with #zerologon / CVE-2020-1472 detection, exploit, DCSync support and a lots of love insi… https://t.co/NHoD4LDAIV https://twitter.com/i/web/status/1306512473114251265 | argevise |
2020-09-17 08:40:04 | CVE-2020-1472 - Exploit Code for CVE-2020-1472 aka Zerologon https://t.co/xnMB9KqQA3 http://github.com/VoidSec/CVE-2020-1472 | pythontrending |
2020-09-17 08:40:04 | zer0dump - Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account p… https://t.co/sY9tVt6H7U https://twitter.com/i/web/status/1306512608925814787 | pythontrending |
2020-09-17 08:20:03 | Are you protected against the recent #Windows Netlogon vulnerability? CVE-2020-1472 is a privilege vulnerability wh… https://t.co/hjZIffm7fD https://twitter.com/i/web/status/1306507821203304448 | UKFast |
2020-09-17 07:50:06 | Zerologon (CVE-2020-1472) が気になる今日この頃。 | masmasjp |
2020-09-17 07:40:08 | CVE-2020-1472: PoC for Zerologon - all research credits go to Tom Tervoort of Secura https://t.co/jpFBLFvraH https://github.com/dirkjanm/CVE-2020-1472 | darksh3llGR |
2020-09-17 07:30:03 | 'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/jwFFDoTTe3 https://twitter.com/i/web/status/1306494731082366978 | AlicePintori |
2020-09-17 07:10:08 | А вы пропатчили свой контроллер домена для защиты от CVE-2020-1472 с CVSS 10? https://t.co/LeM6XtZmYa https://www.kaspersky.ru/blog/cve-2020-1472-domain-controller-vulnerability/29085/ | Batrankov |
2020-09-17 07:10:05 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 - enforcement mode i… https://t.co/TmjuQscRTn https://twitter.com/i/web/status/1306490197413113856 | OvidiuPismac |
2020-09-17 07:00:04 | If you're looking for ways to detect or hunt for abuse of the new #Zerologon or CVE-2020-1472 #vulnerability, keep… https://t.co/emwk49YdJz https://twitter.com/i/web/status/1306487256480460805 | joshlemon |
2020-09-17 06:30:05 | _φ(・_・ [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/67n2k5Bhpq https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | hamaaki |
2020-09-17 05:10:08 | i have reproduced the CVE-2020-1472 zerologon vulnerability! It's an unauth RCE for Domain Controllers. i can also… https://t.co/fH9uC1prVo https://twitter.com/i/web/status/1306457949276004353 | EthanGray___ |
2020-09-17 04:50:06 | GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/gKkdQds4rp https://github.com/SecuraBV/CVE-2020-1472 | piz69 |
2020-09-17 04:40:07 | Windowsドメインコントローラーの乗っ取りを許す可能性のある、Netlogonプロトコルの脆弱性CVE-2020-1472(別名:Zerologon)について。 該当する環境をお持ちの場合はご対応を。Microsoftから出て… https://t.co/t1WTnjNTs7 https://twitter.com/i/web/status/1306450334676660226 | kaspersky_japan |
2020-09-17 03:40:03 | CVE-2020-1472 Zerologon as a Beacon Object File https://t.co/6QqaJidYMv https://youtu.be/zGf1Rat3rEk | MrBlackCipher |
2020-09-17 03:20:05 | CVE-2020-1472のペンテスト、適当にひろってきたPOCでやって、DCでふぐあいがおきて死んじゃうまでがキディの見せ所です | papa_anniekey |
2020-09-17 03:10:05 | Detecting Zerologon (CVE-2020-1472) with Zeek https://t.co/6heGR921MO https://corelight.blog/2020/09/16/detecting-zerologon-cve-2020-1472-with-zeek/ | timyardley |
2020-09-17 02:50:04 | Great explanation of impact of exploiting Zerologon (CVE-2020-1472) https://t.co/y8ruy1y9UU https://twitter.com/_dirkjan/status/1306280553281449985 | jessefmoore |
2020-09-17 02:40:03 | Patch your Windows Servers ASAP - CVE-2020-1472 (Zerologon) is a privilege-escalation with CVSS score of 10 out of… https://t.co/F94fSmzXf1 https://twitter.com/i/web/status/1306422416944648192 | andreanolanusse |
2020-09-17 02:20:05 | เผยช่องโหว่ร้ายแรง CVE-2020-1472 'Zerologon' ในแพตช์ Microsoft เดือนสิงหาคม แนะผู้ใช้อย่าพลาดอัปเดต https://t.co/78Rchg8niI https://www.techtalkthai.com/maximum-critical-in-ms-august-2020-patch-has-been-published/ | ohmohm |
2020-09-17 01:40:06 | CVE-2020-1472 ("Zerologon") - Windows Server vuln w/ 10.0 CVSS score whitepaper #Windows #infosec #Security https://t.co/BOwU7WqAWy https://www.secura.com/pathtoimg.php?id=2055 | sgnn7 |
2020-09-17 01:30:04 | After a #zerologon / CVE-2020-1472 exploit, it'is possible to update the local storage of the DC password with… https://t.co/ewJPvJVTQ9 https://twitter.com/i/web/status/1306404122489491456 | gentilkiwi |
2020-09-17 01:20:05 | 今週になってから話題に上がってますな DCへのパッチ適用となるため、AD互換環境などの検証もお忘れなく:CVE-2020-1472:ドメインコントローラーを脅かす脆弱性 | カスペルスキー公式ブログ https://t.co/LJ7jACf04B https://itnews.org/news_resources/217415 | tamosan |
2020-09-17 00:50:05 | LogStare CollectorでWindowsのイベントログがとれます(10台まで無償)ので、とりあえず管理者のログオンのログを監視することも、CVE-2020-1472(Zerologon)の1つの対策として有効かと思いま… https://t.co/WYZbi73wYS https://twitter.com/i/web/status/1306393533239013376 | ns_lsc |
2020-09-17 00:50:03 | Hot on the heels of the #Zerologon vuln (CVE-2020-1472) @ynadji - a research teammate at @corelight_inc - just open… https://t.co/xLNtlZlzLz https://twitter.com/i/web/status/1306394897218322432 | benreardon |
2020-09-17 00:30:05 | Vulnerabilidad crítica #zeroLogon CVE-2020-1472 permite tener acceso al Domain Controller de #Windows Urgente, apl… https://t.co/Td73YWDg0o https://twitter.com/i/web/status/1306387406065668097 | cesarfarro |
2020-09-16 22:30:04 | Good thread about CVE-2020-1472 #Zerologon and it's consequences. #infosec #CyberSecurity https://t.co/ornJvI0TV4 https://twitter.com/_dirkjan/status/1306280553281449985 | JDouliez |
2020-09-16 22:20:06 | Detectando la explotación de ZeroLogon (CVE-2020-1472). https://t.co/sZJC0CSsWd https://twitter.com/andriinb/status/1306280634751635458 | ProtAAPP |
2020-09-16 21:50:07 | I'm keeping an eye on the CVE-2020-1472 exploit activity on Github, some changes over last days: - Additions of ex… https://t.co/IuzGEtthhq https://twitter.com/i/web/status/1306347491554713601 | GossiTheDog |
2020-09-16 21:40:06 | The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.… https://t.co/MYWAiEjUjl https://twitter.com/i/web/status/1306344788904628225 | abd_elghani |
2020-09-16 21:40:02 | @msftsecurity @MsftSecIntel @WindowsUpdate @msftsecresponse Dear Microsoft: The MSRC advisory for CVE-2020-1472 des… https://t.co/J4UElmlt9S https://twitter.com/i/web/status/1306346701284945925 | KorbenD_Intel |
2020-09-16 20:40:06 | #SecurityAlert: The Zerologon Vulnerability Exploration (CVE-2020-1472) could allow attackers to gain control of a… https://t.co/BmvcV8OeAJ https://twitter.com/i/web/status/1306331107953176577 | ExtraHop |
2020-09-16 20:00:07 | Domain Admin in 10 seconds with #zerologon / CVE-2020-1472 (CVSS:10). Whitepaper and exploits available. Patch your… https://t.co/gkunFCtMzC https://twitter.com/i/web/status/1306319757625290752 | rxcole |
2020-09-16 20:00:04 | PoC released for Zerologon CVE-2020-1472. Patch, and be careful when testing it... RTF-README. https://t.co/ajPTXqIyM4 https://github.com/dirkjanm/CVE-2020-1472 | itsvmme |
2020-09-16 19:50:06 | 'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/sX6NIhiuIW https://twitter.com/i/web/status/1306317690684932096 | 1Ivango1 |
2020-09-16 19:30:08 | New post: Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 – Kashif Ali https://t.co/ruunn2cLku https://reportcybercrime.com/exploit-for-netlogon-remote-protocol-vulnerability-cve-2020-1472-kashif-ali/ | digitpol_cyber |
2020-09-16 19:20:08 | CVE-2020-1472 #security #hacking #cve https://t.co/XJ06WWU8GN | tpx_mx |
2020-09-16 19:10:13 | No te pierdas mi último artículo: CVE-2020-1472 Zerologon https://t.co/K9lNFxZlSA a través de @LinkedIn #Hacking https://www.linkedin.com/pulse/cve-2020-1472-zerologon-rafael-huam%25C3%25A1n-medina | R4Y0H4CK |
2020-09-16 19:10:05 | นักวิจัยปล่อยตัวอย่างโค้ดโจมตีช่องโหว่ CVE-2020-1472 ที่ไมโครซอฟท์แพตช์ตั้งแต่เดือนสิงหาคม เปิดทางยึด AD https://t.co/LrheWIeNH4 https://www.blognone.com/node/118475 | blognone |
2020-09-16 18:40:05 | Very good thread explaining #Zerologon exploit CVE-2020-1472 https://t.co/4t6D44UHRy https://twitter.com/_dirkjan/status/1306280553281449985 | manelrodero |
2020-09-16 18:30:12 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-16 18:30:04 | Microsoft CVE-2020-1472 - ZeroLogin Verificando se o AD está vulnerável: https://t.co/dCsMMdjEsN #ZeroLogon… https://t.co/kmnxacMxPK https://github.com/SecuraBV/CVE-2020-1472 https://twitter.com/i/web/status/1306298926442651650 | pingshell |
2020-09-16 18:00:03 | “Researchers have released exploits for the Windows Zerologon CVE-2020-1472 vulnerability that allow an attacker to… https://t.co/QQvllzw4em https://twitter.com/i/web/status/1306291765213683714 | cyberprotectgrp |
2020-09-16 17:40:04 | Active Directory folks: if you haven't patched CVE-2020-1472 (aka Zerologon) I *strongly* recommend prioritizing p… https://t.co/d7SGDZaEXf https://twitter.com/i/web/status/1306286434488397830 | TomSellers |
2020-09-16 17:30:06 | Find out how to protect domain controllers from CVE-2020-1472 #ZeroLogon and other #ZeroDay vulnerabilities using t… https://t.co/VtxdXklh0O https://twitter.com/i/web/status/1306283274088583169 | AttivoNetworks |
2020-09-16 17:20:12 | We've published vulnerability note VU#490028 about Zerologon / CVE-2020-1472. Windows Domain controllers without th… https://t.co/E9r31UsDvr https://twitter.com/i/web/status/1306279825519382528 | certcc |
2020-09-16 17:20:09 | There seems to be quite some questions and confusion about the impact of exploiting Zerologon (CVE-2020-1472) on th… https://t.co/WsStRS6oSC https://twitter.com/i/web/status/1306280553281449985 | _dirkjan |
2020-09-16 17:20:08 | update on Zerologon attack detection for CVE-2020-1472 2 #sigma host based via audit EventLog ID 4742 & 5829 1 sigm… https://t.co/TrfJKtVwWR https://twitter.com/i/web/status/1306280634751635458 | andriinb |
2020-09-16 17:10:10 | @Ancients @JennaMagius Here you go! CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst… https://t.co/OoENI80yvM https://twitter.com/i/web/status/1306276924788965377 | RiskSense |
2020-09-16 17:10:06 | Zerologon CVE-2020-1472 の Microsoft のアドバイザリなんですが、8月11日のリリース時点では悪用可能性指標が何れも「2 - 悪用される可能性は低い」だったので、あのような詳細ホワイトペーパーが公開… https://t.co/aOmt0Wp8yX https://twitter.com/i/web/status/1306277843727298562 | 0x009AD6_810 |
2020-09-16 17:10:03 | CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/4iyOEOWMZo https://twitter.com/i/web/status/1306278794869833729 | RiskSense |
2020-09-16 16:40:07 | La vulnerabilità CVE-2020-1472 nel protocollo Netlogon, alias Zerologon, permette ai cybercriminali di hackerare i… https://t.co/XtN72IRO3L https://twitter.com/i/web/status/1306269165053976576 | KasperskyLabIT |
2020-09-16 16:30:06 | The more I read on CVE-2020-1472 ('zerologon') the more I cringe. Bad news, right up there with the DNS flaw. Glad… https://t.co/zL3MNHOEca https://twitter.com/i/web/status/1306267830426447872 | initinfosec |
2020-09-16 16:10:05 | La vulnérabilité CVE-2020-1472 menace les contrôleurs de domaine https://t.co/S4oXFByFfY Vous savez quoi faire. https://liens.strak.ch/?QKefmg | StrikStrak |
2020-09-16 15:50:05 | あのサーバは多分大丈夫かな。メモはしておく RT: [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/LBe3JE3sLP https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | tsaka1 |
2020-09-16 15:50:03 | See "How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472" for building… https://t.co/2WnwQHoeXD https://twitter.com/i/web/status/1306258393833844736 | rodtrent |
2020-09-16 15:40:04 | A new #attackerkb assesment on 'CVE-2020-1472 aka Zerologon' has been created by jpcastr0. Attacker Value: 5 | Expl… https://t.co/HYiPg1zCIQ https://twitter.com/i/web/status/1306254998741946369 | Attackerkb_Bot |
2020-09-16 15:20:05 | The second round of patches for Microsoft's CVE-2020-1472 are coming in February 2021. Learn how to keep your netwo… https://t.co/NV0rHW8gTh https://twitter.com/i/web/status/1306249420548304896 | VerSprite |
2020-09-16 15:20:04 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/qcC7z7FOxC https://twitter.com/i/web/status/1306249611888275458 | deepwatch_sec |
2020-09-16 15:10:02 | Vulnerabilidad crítica de escalación de privilegios sobre #NetLogon (MS-NRPC) #CVE-2020-1472 #zerologon… https://t.co/0PJnfzWf7u https://twitter.com/i/web/status/1306248874038882305 | certuy |
2020-09-16 15:00:04 | Have you tested yet whether you've patched correctly for Zerologon CVE-2020-1472? Download our free test tool on Gi… https://t.co/zRQHkwyU9g https://twitter.com/i/web/status/1306245729317523456 | SecuraBV |
2020-09-16 14:30:05 | Microsoft Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472https://cyber.gc.ca/en/alerts/microsoft-netl… https://t.co/EJPzzQJqaD https://twitter.com/i/web/status/1306236455807782912 | threatmeter |
2020-09-16 13:20:04 | CVE-2020-1472 угрожает контроллеру домена https://t.co/6EFpyY14bP https://t.co/Ki8XyYMEmY https://bit.ly/35DBzSB | kilin_vr |
2020-09-16 13:10:08 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/NXlUKNBfa8 http://ow.ly/qx2r102mHHE | Art_Capella |
2020-09-16 13:00:14 | Forscher haben einen funktionierenden Exploit Code für die kritische Sicherheitslücke CVE-2020-1472 entwickelt - Wi… https://t.co/dR6IpPXYHO https://twitter.com/i/web/status/1306213845766111232 | MakroFactory |
2020-09-16 12:50:06 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller - Bl… https://t.co/LscmciepCH https://twitter.com/i/web/status/1306212521729306625 | SecIdSol |
2020-09-16 12:50:03 | Two Steps to Compromise #ActiveDirectory Domain via CVE-2020-1472: 1️⃣# lsadump::zerologon /target:dc01.corp.local… https://t.co/knm87eS5zc https://twitter.com/i/web/status/1306213544585768960 | rimpq |
2020-09-16 12:40:06 | When an attacker bypasses all levels and goes straight to domain admin using CVE-2020-1472. https://t.co/nbVnAFP4rU https://twitter.com/jack3l316/status/1306064534914953220 | hackByNumbers |
2020-09-16 12:40:03 | As a CIO or IT leader, are you sure someone is handling vulnerability CVE-2020-1472, which lets anyone on your netw… https://t.co/yRZeU1Oqna https://twitter.com/i/web/status/1306211230336647168 | stenvesterli |
2020-09-16 12:30:06 | Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を|JPCERT/CC "第三者が既に標的の組織のネットワークに侵入している場合は、本脆弱性を悪用してドメインコントローラーを掌握し、更に侵害… https://t.co/Cgp3eWLH6j https://twitter.com/i/web/status/1306207455660175360 | moneymog |
2020-09-16 12:20:12 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller… https://t.co/e8tf1anTuT https://twitter.com/i/web/status/1306203701426618368 | 1Ivango1 |
2020-09-16 12:20:11 | CVE-2020-1472 угрожает контроллеру домена https://t.co/50ZFj1BGSq https://t.co/P98JNKf5Fy https://bit.ly/2FEY9iE | kmscom3 |
2020-09-16 12:10:07 | GitHub - bb00/zer0dump: Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored mach… https://t.co/UF1c4NlSs6 https://twitter.com/i/web/status/1306201394614067202 | n0ipr0cs |
2020-09-16 11:40:03 | Windows Exploit Released For Microsoft Zerologon Flaw https://t.co/Tyfd0oOcgK (CVE-2020-1472) with a CVSS score of… https://t.co/hvSbNagXm1 https://threatpost.com/windows-exploit-microsoft-zerologon-flaw/159254/ https://twitter.com/i/web/status/1306196044712153092 | samilaiho |
2020-09-16 11:30:08 | Windows Zerologon PoC #exploits allow domain takeover. 😱Patch Now!😱 CVE-2020-1472 https://t.co/mjWDqwLdV4 https://www.bleepingcomputer.com/news/microsoft/windows-zerologon-poc-exploits-allow-domain-takeover-patch-now/ | richardjscott16 |
2020-09-16 11:10:11 | » [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/bPWAK0s9eC https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | yuuyuyu_ka |
2020-09-16 11:10:09 | @BorisTwiet Surprised @Microsoft haven’t updated their Exploitability Assessment for CVE-2020-1472 given there are… https://t.co/Fj1JdatEC8 https://twitter.com/i/web/status/1306187337274138625 | 5niper44 |
2020-09-16 11:00:05 | Jetzt updaten: Die mit dem CVSS-Score 10 bewertete Lücke CVE-2020-1472 in Windows Server kann mittels Zerologon-Exp… https://t.co/EcSLNpd1br https://twitter.com/i/web/status/1306185711838732289 | TrendMicroDE |
2020-09-16 10:50:10 | #zerologon La faille netlogon #CVE-2020-1472 est de criticité 10. Veillez patcher vos DC avec la mise a jour d'août… https://t.co/hL1BqEXkMD https://twitter.com/i/web/status/1306182184135524353 | itpro_tipscom |
2020-09-16 10:50:05 | #Zerologon #vulnerability and where to find it (and solve it) #cybersecurity #kaspersky #netlogon #cve CVE-2020-1472 https://t.co/kJmhhswr4T https://lnkd.in/dYYd9cx | milvius81 |
2020-09-16 10:50:03 | #zerologon #activedirectory #Microsoft #CVE-2020-1472 - criticity level :10! Make sure to patch your domain control… https://t.co/8Q42LoQDZd https://twitter.com/i/web/status/1306183332888276994 | itpro_tipscom |
2020-09-16 10:40:11 | A new #mimikatz 🥝release with #zerologon / CVE-2020-1472 detection, exploit, DCSync support and a lots of love insi… https://t.co/Mj6AkqUa7d https://twitter.com/i/web/status/1306178689630076929 | gentilkiwi |
2020-09-16 10:40:05 | Mimikatz now supports detection and exploitation of CVE-2020-1472 built in. https://t.co/FSHt23gVwV https://twitter.com/gentilkiwi/status/1306178689630076929 | GossiTheDog |
2020-09-16 10:30:06 | Kritische Schwachstelle in ZeroLogon Qualys macht auf die kritische Schwachstelle CVE-2020-1472 aka #ZeroLogon auf… https://t.co/1tTPHFQ4LH https://twitter.com/i/web/status/1306176661063376903 | netzpalaver |
2020-09-16 10:20:07 | Researchers have released exploits for the Windows Zerologon CVE-2020-1472 vulnerability that allow an attacker to… https://t.co/FrgygkFk1F https://twitter.com/i/web/status/1306173735519637505 | nikolozsec |
2020-09-16 10:20:07 | Microsoft issued in August CVE-2020-1472, a vulnerability in NetLogon service that might allow unauthenticated atta… https://t.co/jNt6BK2Du8 https://twitter.com/i/web/status/1306173724375343111 | Israel_Cyber |
2020-09-16 10:10:03 | Instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) via @securabv #Cybersecurity… https://t.co/LT1Zx7gnPe https://twitter.com/i/web/status/1306171762330263552 | omerkaanaslim |
2020-09-16 09:30:03 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/bB90myYGfF http://s.edgarbv.com/30q | sharksandcaviar |
2020-09-16 08:50:04 | Instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) #CyberSecurity #vulnerability https://t.co/3W8Tz6NLWe https://buff.ly/2FCOc57 | CybSec4 |
2020-09-16 08:30:04 | CVE-2020-1472 ist doch sicher schon überall gepatcht, oder? - ODER? #Zerologon #Microsoft #Security… https://t.co/5RpJ6izKjN https://twitter.com/i/web/status/1306148144170688513 | Team_CAIRO |
2020-09-16 08:30:04 | CVE-2020-1472 - PoC for Zerologon - all research credits go to Tom Tervoort of Secura https://t.co/qolPLJ7TB4 http://github.com/dirkjanm/CVE-2020-1472 | pythontrending |
2020-09-16 08:20:09 | CVE-2020-1472 ist doch sicher schon überall gepatcht, oder? - ODER? https://t.co/g21KCJwT4d https://www.secura.com/blog/zero-logon | Team_CAIRO |
2020-09-16 08:10:04 | Microsoft Netlogon Vulnerability (CVE-2020-1472 – Zerologon) – https://t.co/a9t1t78kLe https://blog.qualys.com/vulnerabilities-research/2020/09/15/microsoft-netlogon-vulnerability-cve-2020-1472-zerologon-automatically-discover-prioritize-and-remediate-using-qualys-vmdr | nlawarp |
2020-09-16 08:10:04 | Windows ADやドメインコントローラとネットワーク接続が可能な状況であれば、比較的簡単に実行出来るリスクがある。 CVE-2020-1472 #Windowsドメインコントローラ #ActiveDirectory… https://t.co/ZdXJKtjm86 https://twitter.com/i/web/status/1306141792341880832 | cast_works |
2020-09-16 08:00:06 | Zerologon (CVE-2020-1472)の件も含めて、2020年1月14日にサポートが終了したWindows Server 2008および2008 R2はESUライセンスが無いとパッチを適用できないのか(爆死 https://t.co/xHx8XDispm https://twitter.com/RootLinks_Co/status/1306033888536395777 | RootLinks_Co |
2020-09-16 07:50:04 | “Zerologon (CVE-2020-1472), the most insane vulnerability ever!” https://t.co/PQvTiA5rVh https://lnkd.in/edvYM2G | namikeker |
2020-09-16 07:40:12 | CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft re… https://t.co/atcKbUfxv1 https://twitter.com/i/web/status/1306133501608042497 | AlicePintori |
2020-09-16 07:40:08 | Test tool for CVE-2020-1472. ZeroLogon testing script https://t.co/4l4SdaFO1X https://github.com/SecuraBV/CVE-2020-1472 | 1337core |
2020-09-16 07:30:06 | Kritisk sårbarhet i Netlogon. Det er kritisk sårbarhet i Windows Server kjent som Zerologon (CVE-2020-1472).… https://t.co/DwI3mHikXf https://twitter.com/i/web/status/1306131224746958848 | ncsc_no |
2020-09-16 07:30:03 | お知らせ:CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」 https://t.co/IMUutimjJN https://ift.tt/32yfp1T | magiauk |
2020-09-16 07:20:03 | NetLogon特权提升漏洞(CVE-2020-1472) NetLogon特权提升漏洞(CVE-2020-1472) https://t.co/0RgGa9vYYx https://ift.tt/3hHkLws | threatmeter |
2020-09-16 07:10:11 | #Zerologon la CVE-2020-1472, mostra un Bug al protocol Netlogon que permet tornar-te instantàniament AD (administra… https://t.co/9rS3wrfCMk https://twitter.com/i/web/status/1306125674076348417 | carlesbrunet_ |
2020-09-16 07:10:07 | @_black_traffic_ @veorq FWIW @HostileSpectrum "Braced for arguments over whether CVE-2020-1472 was intended as a bu… https://t.co/X8ra32Rndr https://twitter.com/i/web/status/1306126664443801601 | daniel_bilar |
2020-09-16 07:10:05 | Patch It - Windows #Zerologon CVE-2020-1472 vulnerability allowing attacker to take control of Windows domain https://t.co/Dy98hH5kiN https://lnkd.in/eVkj2GR | MBSL_Security |
2020-09-16 06:30:07 | CVE-2020-1472ィ… | Ryu_ClairdeLune |
2020-09-16 06:30:06 | CVE-2020-1472に関連する Netlogon セキュアチャネル接続の変更に関連するイベント ID の監視に役立つスクリプト https://t.co/b991kxLKih このスクリプトやべぇな。コードが部分的に翻訳されてて、動かない。 https://support.microsoft.com/ja-jp/help/4557233/script-to-help-in-monitoring-event-ids-related-to-changes-in-netlogon | mutaguchi |
2020-09-16 05:50:12 | Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/LX2qQeQuoy #appsec #security #secops https://ift.tt/2H4xVH8 | rtcz_io |
2020-09-16 05:20:09 | 【注意喚起】 Microsoft製品(Windows Server)の脆弱性について、IPAが注意喚起をしています(CVE-2020-1472)。 攻撃が行われた場合の影響が大きいため、2020年8月の月例更新プログラムを未適用の… https://t.co/RG1IEP8Cn4 https://twitter.com/i/web/status/1306100105267691521 | nisc_forecast |
2020-09-16 05:00:04 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/AHPaxcIPMX https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | Mitsuki_Shirase |
2020-09-16 05:00:04 | Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/JX17lelHLa @jpcert https://www.jpcert.or.jp/newsflash/2020091601.html | Mitsuki_Shirase |
2020-09-16 04:10:06 | Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/m3C6mDgqfn http://hrbt.us/212467 | hardreboot |
2020-09-16 04:10:03 | นักวิจัยทดสอบควบคุมโดเมนโดยเจาะไปยังช่องโหว่ Windows Zerologon CVE-2020-1472 ที่ทาง Microsoft ออก patch สำหรับเดือน… https://t.co/6bFNN5Gmuq https://twitter.com/i/web/status/1306082743894200322 | TCyberDefense |
2020-09-16 04:00:03 | GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 - https://t.co/iYmyaxvH5i https://github.com/SecuraBV/CVE-2020-1472 | yuminosira |
2020-09-16 03:50:04 | オンプレミス Active Directory 管理者はパッチをあてましょう。 [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Respons… https://t.co/0OA6ePLite https://twitter.com/i/web/status/1306077323133812737 | thdy5 |
2020-09-16 03:20:06 | Microsoft Netlogon Vulnerability (CVE-2020-1472 – Zerologon) – Automatically Discover, Prioritize and Remediate Usi… https://t.co/QD9jvgAkdQ https://twitter.com/i/web/status/1306068150794948610 | MathWebEntry |
2020-09-16 03:20:05 | Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/nOWd8SAxk0 @jpcert https://t.co/p9VRegA3ap https://www.jpcert.or.jp/newsflash/2020091601.html https://twitter.com/taku888infinity/status/1305728440268591111 | taku888infinity |
2020-09-16 03:00:05 | New post: "Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472)" https://t.co/HnHNfcXuzA https://ift.tt/35F3Wj3 | Myinfosecfeed |
2020-09-16 02:50:06 | CVE-2020-1472: Zerologon: instantly become domain admin by subverting Netlogon cryptography https://t.co/d977az2vpi… https://t.co/Uq8sdHxPF6 http://dlvr.it/RghYMm https://twitter.com/i/web/status/1306060746120257536 | blueteamsec1 |
2020-09-16 02:50:04 | Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/dcCxZJkP6i https://www.jpcert.or.jp/newsflash/2020091601.html | ohhara_shiojiri |
2020-09-16 02:50:03 | 統合版 JPCERT/CC | お知らせ:CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」 https://t.co/9fDti7MAjf #itsec_jp https://ift.tt/32yfp1T | itsec_jp |
2020-09-16 02:30:03 | Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/2zNV5R9gJJ https://github.com/dirkjanm/CVE-2020-1472 | _r_netsec |
2020-09-16 02:20:04 | お知らせ:CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」 https://t.co/ilBODhR3JO https://www.jpcert.or.jp/newsflash/2020091601.html | microkeyword |
2020-09-16 02:00:07 | CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」を公開。Active Directory の管理者は、更新プログラムの適用や自組織で必要となる対応など詳細をご… https://t.co/WMZSEQh6bU https://twitter.com/i/web/status/1306049410040643584 | jpcert |
2020-09-16 02:00:05 | Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を - jpcert (2020/09/16) https://t.co/WPeFWGwVMf https://www.jpcert.or.jp/newsflash/2020091601.html | spread_jp |
2020-09-16 01:30:04 | #Cybersecurity #InfoSec @buffaloverflow: 'Zerologon (CVE-2020-1472) in .NET for some execute-assembly fun.. muahah… https://t.co/im1v6D4rDz https://twitter.com/i/web/status/1306041965289631746 | SritaKaren |
2020-09-16 01:20:03 | Trending News: @buffaloverflow: 'Zerologon (CVE-2020-1472) in .NET for some execute-assembly fun.. muahaha 👿😄 '… https://t.co/ShLZMva5IE https://twitter.com/i/web/status/1306039454709223426 | susession |
2020-09-16 01:10:10 | CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft re… https://t.co/kOtxGhc8WY https://twitter.com/i/web/status/1306035197322772481 | 1Ivango1 |
2020-09-16 01:00:06 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/6UHwczBehN http://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | toshiukiii |
2020-09-16 01:00:05 | Zerologon (CVE-2020-1472)のCVSSスコア10.0なのすげ~。 | CyberBrainFish |
2020-09-16 01:00:03 | Zerologon (CVE-2020-1472)の件、取り合えず検証環境でWindowsUpdate実施したら”Attack failed”は確認できた。 でもDC再起動は深夜になるだろうな… https://t.co/7ENnbvhQYL https://twitter.com/i/web/status/1306033888536395777 | RootLinks_Co |
2020-09-16 00:00:05 | Abusing CVE-2020-1472 (ZeroLogon) https://t.co/uLuKMKGion http://infinitelogins.com/2020/09/15/abusing-cve-2020-1472-zerologon/ | infinitelogins |
2020-09-16 00:00:04 | Top story: @buffaloverflow: 'Zerologon (CVE-2020-1472) in .NET for some execute-assembly fun.. muahaha 👿😄 '… https://t.co/i13iIXqOKr https://twitter.com/i/web/status/1306018076501172224 | securitycrusade |
2020-09-15 23:50:03 | Zerologon (CVE-2020-1472) vuln: Domain Admin privileges immediately from unauthenticated network access. Patch your… https://t.co/OHg7Q0Czj1 https://twitter.com/i/web/status/1306016811532652544 | kerouanton |
2020-09-15 23:40:04 | CVE-2020-1472. Have you patched? https://t.co/uBoZh0ri7F https://arstechnica.com/?post_type=post&p=1706068 | Cephurs |
2020-09-15 23:40:03 | 「8月11日マイクロソフトは月例セキュリティパッチをリリース…CVE-2020-1472 Netlogon Elevation of Privilege Vulnerabilityと呼ばれる脆弱性に対する、パッチが含まれていた」… https://t.co/qMxDX9BLcb https://twitter.com/i/web/status/1306014520796762112 | maquino |
2020-09-15 23:30:06 | #Zerologon: instantly become #DomainAdmin by subverting Netlogon cryptography (CVE-2020-1472) (CVSS score: 10.0)… https://t.co/sUTBrz2vO0 https://twitter.com/i/web/status/1306010218011258882 | alvisharding |
2020-09-15 23:20:04 | 備忘録がてら書いてみた。 Zerologon (CVE-2020-1472) について|釜山公徳 (Masanori KAMAYAMA) #note https://t.co/lYQurP3cWk https://note.com/masadaart/n/n793e1ecdb5b5 | masart_3 |
2020-09-15 23:20:04 | Zerologon CVE-2020-1472 ドメイン参加のPCからパスワードセットされるのかー。 https://t.co/z4FJCJCv7t | dragonstar7722 |
2020-09-15 23:10:05 | Windows Server: Zerologon vulnerability (CVE-2020-1472) allows domain hijacking https://t.co/80LCnWu6e0 #Security… https://t.co/xn4HORIKjb https://borncity.com/win/?p=15841 https://twitter.com/i/web/status/1306006802472013824 | etguenni |
2020-09-15 23:00:07 | Windows Server: Zerologon-Sicherheitslücke (CVE-2020-1472) erlaubt Domain Übernahme https://t.co/7NYrAdqU7g… https://t.co/zeTvLUXsec https://www.borncity.com/blog/2020/09/16/windows-server-zerologon-sicherheitslcke-cve-2020-1472-erlaubt-domain-bernahme/ https://twitter.com/i/web/status/1306002525318008832 | etguenni |
2020-09-15 23:00:05 | “[CVE-2020-1472] basically allows any attacker on the local network (such as a malicious insider or someone who sim… https://t.co/8wh9n51rc8 https://twitter.com/i/web/status/1306003031071354881 | adrianarvizo |
2020-09-15 22:20:05 | The CVE-2020-1472 vulnerability in the #Netlogon protocol, aka #Zerologon, lets attackers hijack a Windows domain c… https://t.co/nbi1CydLSM https://twitter.com/i/web/status/1305992810198429696 | GustavoColsKL |
2020-09-15 22:20:04 | CVE-2020-1472 https://t.co/9Jq53aaSAk https://arstechnica.com/information-technology/2020/09/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched/ | CVEannounce |
2020-09-15 22:20:03 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller… https://t.co/W86pI2K3h6 https://twitter.com/i/web/status/1305993842953318400 | TheCoinWarrior |
2020-09-15 22:00:02 | “[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center” https://t.co/D8Xslf3jhY https://htn.to/wZfLh9gNhw | modokey |
2020-09-15 21:50:03 | Y esta es importante,CVE-2020-1472 no solo por el 10 de CVSS si no por que existe exploit público y funciona...… https://t.co/elHz9GKtEQ https://twitter.com/i/web/status/1305986882686328837 | ESFERARED |
2020-09-15 21:50:02 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/qZ31pvhbUZ http://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | freude710 |
2020-09-15 21:40:03 | Microsoft Netlogon Vulnerability (CVE-2020-1472 – Zerologon) – Automatically Discover, Prioritize and Remediate Usi… https://t.co/D9nQiZD8V3 https://twitter.com/i/web/status/1305984421489762310 | boardtownblast |
2020-09-15 21:10:06 | Take note that exploiting CVE-2020-1472 (#Zerologon) can give you Domain Admin creds on the one hand - but breaks t… https://t.co/thmQtseKSF https://twitter.com/i/web/status/1305975937603981314 | Sam0rai |
2020-09-15 21:00:06 | Hunting for domain controllers to mitigate the Zerologon (CVE-2020-1472) issue? Give this Rumble query a shot:… https://t.co/f55YasW3zW https://twitter.com/i/web/status/1305974053782552577 | RumbleDiscovery |
2020-09-15 20:50:06 | Si @pablogonzalezpe dice esto sobre ZeroLogon (CVE-2020-1472) es que hay que parchear ya! https://t.co/z2IaOToQRl https://twitter.com/pablogonzalezpe/status/1305874055178878979 | ProtAAPP |
2020-09-15 20:40:09 | Speaking about CVE-2020-1472 - Just a periodic reminder to check the ACL permissions that have been set on your DC… https://t.co/AibEiQjqVK https://twitter.com/i/web/status/1305967310491004936 | DebugPrivilege |
2020-09-15 20:40:07 | That moment when the weaponized zer0day comes out during your internal audit. #CVE-2020-1472 #win #pwned… https://t.co/DahVF4gJzw https://twitter.com/i/web/status/1305967680093138945 | 5M7X |
2020-09-15 20:30:07 | A vuln that if exploited results in a total compromise of Windows domain controllers. CVE-2020-1472 aka #ZeroLogon… https://t.co/r10IzW199M https://twitter.com/i/web/status/1305965154052513793 | vloquet |
2020-09-15 20:20:04 | #Vulnerabilidad (CVE-2020-1472) nombrada como Zerologon, esta falla toma ventaja de un algoritmo criptográfico débi… https://t.co/pxSyr4t1IE https://twitter.com/i/web/status/1305964062698811392 | ArkaviaNetworks |
2020-09-15 20:10:04 | Recommendations for @Microsoft #Netlogon vulnerability (CVE-2020-1472, a.k.a. #Zerologon) that allows an unauthenti… https://t.co/uVHWyAgwYf https://twitter.com/i/web/status/1305960328627322880 | qualys |
2020-09-15 20:10:03 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/82MOG58t0B https://www.secura.com/blog/zero-logon | bpreneel1 |
2020-09-15 20:00:04 | "A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit (CVE-2020-1472)." 👍… https://t.co/2ghBQU3hLb https://twitter.com/i/web/status/1305958818719899649 | kaynemcgladrey |
2020-09-15 20:00:03 | Microsoft Netlogon Vulnerability (CVE-2020-1472 – Zerologon) – Automatically Discover, Prioritize and Remediate Usi… https://t.co/P1zXf94DvJ https://twitter.com/i/web/status/1305959085087420416 | shah_sheikh |
2020-09-15 19:50:09 | more detection traces were uploaded to the EVTX repo for CVE-2020-1472 https://t.co/xuFuwB6lOr… https://t.co/ZbLf9GetUf https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES/blob/master/Credential%20Access/Zerologon_VoidSec_CVE-2020-1472_4626_LT3_Anonym_follwedby_4742_DC_Anony_DC.evtx https://twitter.com/i/web/status/1305955829301104640 | SBousseaden |
2020-09-15 19:40:07 | PoC EXPLOIT for #CVE-2020-1472 https://t.co/H5l7zbO1Mv https://github.com/dirkjanm/CVE-2020-1472 | kbcboy |
2020-09-15 19:20:03 | #PATCH CVE-2020-1472: 32 exploits sous github via GG de la faille critique #ZeroLogon Si vous couplez cela avec le… https://t.co/xa1jwBLjb9 https://twitter.com/i/web/status/1305948802663223298 | FabianRODES |
2020-09-15 19:10:08 | Zer0dump is an PoC exploit/tool for abusing the vulnerabilities associated with CVE-2020-1472 (Zerologon) in order… https://t.co/eWyYc5PyrC https://twitter.com/i/web/status/1305945163949318144 | malwaresick |
2020-09-15 19:10:07 | SharpZeroLogon - This is an exploit for CVE-2020-1472, a.k.a. Zerologon. This tool exploits a cryptographic vulnera… https://t.co/3KP15OVddX https://twitter.com/i/web/status/1305945513003540482 | malwaresick |
2020-09-15 19:00:03 | ZeroLogon testing script - CVE-2020-1472 #CyberSecurity https://t.co/WbPrwvrVQe https://github.com/SecuraBV/CVE-2020-1472 | malwaresick |
2020-09-15 19:00:02 | CVE-2020-1472: Zerologon #CyberSecurity https://t.co/obpg7e5OJe https://github.com/blackarrowsec/redteam-research/tree/master/CVE-2020-1472 | malwaresick |
2020-09-15 18:50:03 | CVE-2020-1472: Zerologon Unauthenticated Domain Controller compromise of the computer account password.… https://t.co/8D8SJlWviP https://twitter.com/i/web/status/1305941744656109568 | jas502n |
2020-09-15 18:50:03 | ⚠️ CVE-2020-1472 Zerologon ⚠️ Vulnerabilidad crítica con un CVSS 10.0 Parche MS: https://t.co/SnR749jQSf Whitepape… https://t.co/YI3CMrb8gy https://lnkd.in/dYW6JY7 https://twitter.com/i/web/status/1305941684363157509 | adrianlois_ |
2020-09-15 18:40:11 | ⚠️🚨IMPORTANTE LEERLO Y COMPARTIR📢 CVE-2020-1472:La vulnerabilidad ‘Zerologon’, dentro del artículo te explicamos co… https://t.co/sCD05sd7Sq https://twitter.com/i/web/status/1305936959051882496 | GBSolution |
2020-09-15 18:40:10 | Last month, #Microsoft released a patch for critical vulnerability CVE-2020-1472, also known as the Zerologon vulne… https://t.co/8x5exBDIcc https://twitter.com/i/web/status/1305936963745263618 | kaspersky |
2020-09-15 18:40:07 | CVE-2020-1472: The Netlogon exploit that provides complete control of your Windows system to hackers easily. Patch… https://t.co/NkVtqp2B5N https://twitter.com/i/web/status/1305938237207314433 | AlexaGm33043450 |
2020-09-15 18:30:10 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-15 18:10:08 | 2020 continues to bubble up major crypto flaws: CVE-2020-0601 ECC CryptoAPI, and now CVE-2020-1472 Zerologon RPC Ne… https://t.co/mtmIAmSVhj https://twitter.com/i/web/status/1305929767300915200 | modubyk |
2020-09-15 18:10:06 | Die mit dem CVSS-Score 10 bewertete Lücke CVE-2020-1472 in Windows Server kann mittels "Zerologon" ausgenutzt werde… https://t.co/L3TCiIpHdn https://twitter.com/i/web/status/1305930582363451392 | DigitalDynasty4 |
2020-09-15 18:10:06 | CVE-2020-1472 Big yikes | gravest0rm |
2020-09-15 18:10:02 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/TUq8oQontx https://twitter.com/i/web/status/1305931764309909505 | deepwatch_sec |
2020-09-15 18:00:03 | #infosec #informationsecurity #hacking #Microsoft CVE-2020-1472: The Netlogon exploit that provides complete contro… https://t.co/pGfFkHxtw6 https://twitter.com/i/web/status/1305928606770577409 | Webimprints |
2020-09-15 18:00:02 | #Cibersegruidad #infosec #seguridad #hacking CVE-2020-1472: El exploit Netlogon que brinda control completo de su s… https://t.co/whQvEHSqzF https://twitter.com/i/web/status/1305928709157740544 | Webimprints |
2020-09-15 17:50:05 | #CVE-2020-1472 #detection using @Zeekurity https://t.co/Yw0b5Hw0DI https://twitter.com/d1vious/status/1305917664590729216 | drewchurch |
2020-09-15 17:20:06 | A @splunk detection for #Zerologon CVE-2020-1472 using Zeek RPC logs. Looking for a pattern of operations NetrServe… https://t.co/vqKOA49Iuo https://twitter.com/i/web/status/1305917664590729216 | d1vious |
2020-09-15 17:00:04 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472… https://t.co/5Mx5rkLWJ3 https://twitter.com/i/web/status/1305913780610699264 | NcuIsao |
2020-09-15 16:50:10 | Situations like CVE-2020-1472 show why it's a bad idea to go cheap on your IT. | siliconundergro |
2020-09-15 16:40:03 | New post: The CVE-2020-1472 vulnerability threatens domain controllers https://t.co/dkJbcpfO7M https://reportcybercrime.com/the-cve-2020-1472-vulnerability-threatens-domain-controllers/ | digitpol_cyber |
2020-09-15 16:30:07 | CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/QQeryOW3Hu https://twitter.com/i/web/status/1305904233951244294 | RiskSense |
2020-09-15 16:30:06 | Zerologon: Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/FYq397mMEs https://www.secura.com/pathtoimg.php?id=2055 | tomasdeml |
2020-09-15 16:30:05 | CVE-2020-1472 (aka #Zerologon) is a great finding! but is it just in my crazy head that this seems a backdoor ?? I… https://t.co/xT58W7BXSm https://twitter.com/i/web/status/1305905187484295174 | pipasnacave |
2020-09-15 16:20:08 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) via @tiuxo… https://t.co/DV05QLra74 https://twitter.com/i/web/status/1305901759223590915 | lobsters |
2020-09-15 16:20:02 | Patchée par Microsoft en août 2020, la vulnérabilité CVE-2020-1472 surnommée Zerologon permet à un pirate de prendr… https://t.co/Qp6shzmVUK https://twitter.com/i/web/status/1305903920271695874 | ymoricea |
2020-09-15 16:10:07 | Exploit code available for ‘Zerologon’ vulnerability (CVE-2020-1472) that affects Microsoft Netlogon… https://t.co/TW72upjzcj https://twitter.com/i/web/status/1305899344940408834 | securezoo |
2020-09-15 16:10:05 | Just completed some last-minute updates to secure our Hacking Enterprises training labs from CVE-2020-1472… https://t.co/Nv3PCv3fT3 https://twitter.com/i/web/status/1305900340848537600 | insecurity_ltd |
2020-09-15 16:00:05 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/dG5Xk1FFXf http://dlvr.it/RgfvS0 | nichii_a |
2020-09-15 16:00:04 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/8SCy4y70Q3 https://buff.ly/2FCOc57 | kentonsmith |
2020-09-15 15:50:03 | Zerologon (CVE-2020-1472) in .NET for some execute-assembly fun.. muahaha 👿😄 https://t.co/dP6ivamS1H | buffaloverflow |
2020-09-15 15:20:07 | Pop quiz: 1) Did you deploy the August MSFT #patch for CVE-2020-1472 to ALL endpoints? If yes, good. Read this art… https://t.co/c1go0HR7Xy https://twitter.com/i/web/status/1305886898150404097 | baramundiWORLD |
2020-09-15 15:20:03 | CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/IyeSUPmKaU https://blog.rapid7.com/2020/09/14/cve-2020-1472-zerologon-critical-privilege-escalation/ | kit_kiran |
2020-09-15 15:00:15 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/BsyAXL2YPj http://ow.ly/uQPM102mBrc | Patent_4405829 |
2020-09-15 14:50:18 | Only 3 seconds needed. Just use 0's and you are logged on. Check your domain controllers for CVE-2020-1472 vulnerab… https://t.co/LlUssTUC4n https://twitter.com/i/web/status/1305879554192334848 | Michal_Jarski |
2020-09-15 14:50:03 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 Attackers could exploit this vulnerability to o… https://t.co/2tuR3i8y7J https://twitter.com/i/web/status/1305881416375427075 | DoITSecurity |
2020-09-15 14:40:06 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) (via @SecuraBV) https://t.co/92X8f1oqLJ https://buff.ly/2FCOc57 | lordman1982 |
2020-09-15 14:40:05 | So just been testing the @SecuraBV #Zerologon CVE-2020-1472 PoC by @_dirkjan and it's a big yikes for sure! And ve… https://t.co/EtVqyzXpBX https://twitter.com/i/web/status/1305876972178935808 | bleepsec |
2020-09-15 14:30:05 | New Windows exploit (CVE-2020-1472) lets you instantly become admin Info: Zerologon lets anyone with a network toe… https://t.co/10UKv4vNba https://twitter.com/i/web/status/1305874808664621062 | CKsTechNews |
2020-09-15 14:30:04 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/8cODFadUcZ https://www.tenable.com/blog/cve-2020-1472-zerologon-vulnerability-in-netlogon-could-allow-attackers-to-hijack-windows | JacobDjWilson |
2020-09-15 14:20:08 | Kritiska MS Netlogon ievainojamība CVE-2020-1472 ļauj uzbrucējam atiestatīt aktīvās direktorijas (Active Directory)… https://t.co/HXM68RAZoi https://twitter.com/i/web/status/1305871774350020610 | certlv |
2020-09-15 14:20:06 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/b2n6SY9pLL https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | IINAlab |
2020-09-15 14:20:05 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/fvZkfJKf6m https://aeternusmalus.wordpress.com/2020/09/15/blog-zerologon-instantly-become-domain-admin-by-subverting-netlogon-cryptography-cve-2020-1472-2/ | DoggoJoshu |
2020-09-15 14:10:08 | If you haven't run #Microsoft's August 2020 patches on your servers, DO IT NOW. An important patch, CVE-2020-1472,… https://t.co/slh07wclTz https://twitter.com/i/web/status/1305869054767443969 | brycea |
2020-09-15 14:10:05 | The 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller. CVE-2020-1472… https://t.co/v999DloNl9 https://twitter.com/i/web/status/1305870226345656320 | cybersmithIO |
2020-09-15 14:10:05 | POC for Microsoft's "#Zerologon" CVSS 10 bug (CVE-2020-1472), patched in Aug. https://t.co/I5jbj8jH0k Via @securabv… https://t.co/lrGmHMXKu5 https://www.secura.com/blog/zero-logon https://twitter.com/i/web/status/1305870113409728512 | CBREditor |
2020-09-15 14:00:09 | New post: CVE-2020-1472 угрожает контроллеру домена | Блог Касперского https://t.co/SUTYO1ynVl https://reportcybercrime.com/cve-2020-1472-угрожает-контроллеру-домена-блог-к/ | digitpol_cyber |
2020-09-15 14:00:06 | Shoutout to Elias for creating an awesome and easy to use PoC for CVE-2020-1472 / Zerologon. This was tested on… https://t.co/srWEHLXGRq https://twitter.com/i/web/status/1305867533233291265 | s1nfulz |
2020-09-15 13:50:04 | CVE-2020-1472 POC is available! Allows you to change the DC machine account password so you can DCSync. It also inc… https://t.co/2UnK2VVgZK https://twitter.com/i/web/status/1305865563286188034 | TimMedin |
2020-09-15 13:40:06 | PoC for #Zerologon vulnerability @CVEnew @CVEannounce CVE-2020-1472 which could allow us to carry out an unauthenti… https://t.co/F5myKVINNQ https://twitter.com/i/web/status/1305861969128415233 | misaelban |
2020-09-15 13:40:03 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller… https://t.co/OxAzV36po1 https://twitter.com/i/web/status/1305863884708950019 | lizbeth_plaza |
2020-09-15 13:30:06 | CVE-2020-1472 Netlogon authentication bypass. https://t.co/jCPMwO061G #infosec #CVE https://t.co/YQ8VACOr5Y https://github.com/SecuraBV/CVE-2020-1472 | RapidSafeguard |
2020-09-15 13:30:05 | Zerologon : instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) :… https://t.co/F5VV7sCuJ1 https://twitter.com/i/web/status/1305861031995092992 | binitamshah |
2020-09-15 13:30:05 | @CVEnew @CVEannounce New vulnerability #CVE CVE-2020-1472 #Microsoft #Windows Netlogon authentication bypass.… https://t.co/JHKz7G7ODF https://twitter.com/i/web/status/1305860326798352387 | misaelban |
2020-09-15 13:30:04 | @GossiTheDog @ItsReallyNick @James_inthe_box @campuscodi Can I get a confirmation that CVE-2020-1472 phase 1 patch… https://t.co/KnzhIP1rxK https://twitter.com/i/web/status/1305861152715440134 | KorbenD_Intel |
2020-09-15 13:20:03 | CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/1IQpJ7ccJT https://blog.rapid7.com/2020/09/14/cve-2020-1472-zerologon-critical-privilege-escalation/ | nujakcities |
2020-09-15 13:10:05 | CVE-2020-1472 угрожает контроллеру домена https://t.co/drbIyjOmKg https://t.co/zlGLq34kK5 https://bit.ly/32vg1W3 | kmscom3 |
2020-09-15 13:00:07 | New post: Netlogon 特权提升漏洞通告(CVE-2020-1472) https://t.co/KIKpi0EEgA特权提升漏洞通告(cve-2020-1472)/ https://reportcybercrime.com/netlogon- | digitpol_cyber |
2020-09-15 13:00:05 | CVE-2020-1472 - Microsoft did it again. Time to pwn the world! https://t.co/f7SWQsAUP0 | sw33tcr4b |
2020-09-15 13:00:03 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/RCFr5cdR7o https://t.co/MUxIU6gieF https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | SecureNetIT |
2020-09-15 13:00:03 | 次の4連休、1日休めれば良いかと思いきや Zerologon (CVE-2020-1472)対応で 連休最終日と次の土日とかで対応しないとまずいかなぁ😱 UTM類は、この間、アップデートしたから脆弱性は無いといえ… | itnews_jp |
2020-09-15 12:20:11 | Hacker können über Schwachstelle Windows Domain-Controller kapern CVE-2020-1472: Die Sicherheitsanfälligkeit "Zerol… https://t.co/B09mnuXdcF https://twitter.com/i/web/status/1305839452808523776 | sec_euro |
2020-09-15 12:20:04 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/fgAzQmhKCk http://ow.ly/MYrf102mAB1 | BullStallcup |
2020-09-15 12:20:03 | @canyoupwnme here the exploit code for CVE-2020-1472 | Void_Sec |
2020-09-15 12:10:07 | CVE-2020-1472 has highlighted why every company must ensure patching is given the attention it needs. I see to man… https://t.co/6YeKeOtrQt https://twitter.com/i/web/status/1305839773022593024 | WannabeCISO |
2020-09-15 12:10:06 | やんないといけなさそう😓→[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/nQg3VBn2LE http://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | itnews_jp |
2020-09-15 12:10:03 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/3gR8chMqdF http://ow.ly/Zhav102mAAp | Art_Capella |
2020-09-15 12:00:07 | CVE-2020-1472 is this generations MS08-067 Pentesters be like, AMEN!!! | dcuthbert |
2020-09-15 11:50:05 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/0KiYPBC48i http://ow.ly/8vXO102mAwZ | AlicePintori |
2020-09-15 11:20:03 | NetLogon特权提升漏洞(CVE-2020-1472): NetLogon特权提升漏洞(CVE-2020-1472) https://t.co/0koGaSmqLC https://goo.gl/fb/cLUH3s | threatmeter |
2020-09-15 11:00:05 | CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/xInU0N6ID6 https://blog.rapid7.com/2020/09/14/cve-2020-1472-zerologon-critical-privilege-escalation/ | Bo_Datenschutz |
2020-09-15 11:00:05 | Act & Patch Now. CVE-2020-1472 "Zerologon" Critical Privilege Escalation Vulnerability Compromises Domain Controlle… https://t.co/ZpwZ3CeX8n https://twitter.com/i/web/status/1305822816907014144 | AshcoSystems |
2020-09-15 11:00:04 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/jbRS3nfBXo https://www.secura.com/blog/zero-logon | unkn0wnbit |
2020-09-15 10:50:07 | Zerologon (CVE-2020-1472) は、今後ガッツリ使われていくんだろうなぁ。 パッチ当ててないけど外にポイント設けてないから平気、とか言ってると、一般ユーザーがひっかかってC2Cとの中継ファイルを仕掛けられて、攻撃されるんだろうなぁ。 | 96sc_ |
2020-09-15 10:50:04 | RODCも影響受けるらしい。 How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/wDnx5F9Mp7 https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | link_speed |
2020-09-15 10:40:04 | https://t.co/xBrKgdn91s Zerologon (CVE-2020-1472) PoC by #modifying the #original test tool from #secura https://t.co/vEcyv55a2A http://anonymous.bravehost.com/main/2020/09/15/119890/hacking/ | VitalAnon |
2020-09-15 10:30:08 | 🔴 Vulnerabilidad en el Netlogon Remote Protocol (MS-NRPC) de Microsoft (CVE-2020-1472) Vulnerabilidad de elevación… https://t.co/v1o2mWPqX1 https://twitter.com/i/web/status/1305813619565883392 | juliobalderrama |
2020-09-15 10:20:05 | CVE-2020-1472 - Zerologon PoC https://t.co/7Sob6bf5vm https://raw.githubusercontent.com/blackarrowsec/redteam-research/master/CVE-2020-1472/CVE-2020-1472.py | staatsgeheim |
2020-09-15 10:10:09 | Are your domain controllers safe from Zerologon attacks?: CVE-2020-1472, a privilege elevation vulnerability in the… https://t.co/g3u1oTNHOm https://twitter.com/i/web/status/1305808841360113666 | shah_sheikh |
2020-09-15 10:10:07 | Are your domain controllers safe from Zerologon attacks?: CVE-2020-1472, a privilege elevation vulnerability in the… https://t.co/iR1pC4oBsj https://twitter.com/i/web/status/1305810483383918593 | cipherstorm |
2020-09-15 09:50:09 | Secura has published a whitepaper on CVE-2020-1472 or 'Zerologon', a CVSS 10.0 vulnerability in the Netlogon protoc… https://t.co/6oVoWXNtyU https://twitter.com/i/web/status/1305803554645565440 | virusbtn |
2020-09-15 09:50:07 | #security #Alerta #Alarmin de la CISA "Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472" lindo par… https://t.co/TMWYfO36Bd https://twitter.com/i/web/status/1305804261952028672 | INFOmailiTV |
2020-09-15 09:50:07 | CVE-2020-1472 exploit has been released. Don't forget to patch every domain controllers in your network. Note that… https://t.co/3hRIfjCowu https://twitter.com/i/web/status/1305804259871645696 | gmillour_ |
2020-09-15 09:40:08 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/BXOx7stlZW https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | staatsgeheim |
2020-09-15 09:40:08 | Meet #Zerologon aka CVE-2020-1472, a Windows exploit developed by researchers from security firm #Secura. It allows… https://t.co/aXiphFWLZg https://twitter.com/i/web/status/1305801616239529985 | iCyberFighter |
2020-09-15 09:40:06 | Run exploit Zerologon (CVE-2020-1472) Thanks @_dirkjan #NCSCVietnam #Zerologon #infosec #cve #security #hacking https://t.co/FncmjLZNeP | NcscVietnam |
2020-09-15 09:30:07 | #ITSecurity : CVE-2020-1472: Zerologon https://t.co/jP5TdfEv3V https://github.com/blackarrowsec/redteam-research/tree/master/CVE-2020-1472 | GAILLOTPatrice |
2020-09-15 09:30:05 | Run exploit Zerologon (CVE-2020-1472) Thanks @_dirkjan https://t.co/wL0Aue92Ur https://t.co/cMf8BVZHFz https://github.com/dirkjanm/CVE-2020-1472 | NcscVietnam |
2020-09-15 09:20:04 | CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability https://t.co/Vvj6HULOgj https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472 | PVynckier |
2020-09-15 09:20:03 | #ITSecurity : Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/TSlwakzBff https://www.secura.com/blog/zero-logon | GAILLOTPatrice |
2020-09-15 09:00:06 | Zerologon (CVE-2020-1472) を ADサーバ側でパケット取りながら自分でも検証。 Whitepaper を見返したり、通信見返したりしてるけど、やっぱり色々驚く(… https://t.co/fFBB9ehZTw https://twitter.com/i/web/status/1305792199066488833 | mimura1133 |
2020-09-15 09:00:04 | We did the #zerologon PoC yesterday thanks to @SecuraBV awesome CVE-2020-1472+paper. Congratz on the beautiful find… https://t.co/03s24tlDmS https://twitter.com/i/web/status/1305792951600197632 | w_levin |
2020-09-15 08:50:07 | Companies who offer CIFS/SMB on @NetApp filers may want to read this article about the impact of CVE-2020-1472 on O… https://t.co/0rq9qiWpiV https://twitter.com/i/web/status/1305788665273167872 | RFC2321 |
2020-09-15 08:40:06 | Fully working exploit, Zerologon: CVE-2020-1472 https://t.co/vNTYcoFY1U https://github.com/blackarrowsec/redteam-research/tree/master/CVE-2020-1472 | omarbv |
2020-09-15 08:40:05 | A new #attackerkb assesment on 'CVE-2020-1472 aka Zerologon' has been created by VoidSec. Attacker Value: 5 | Explo… https://t.co/GG7BHz3bJd https://twitter.com/i/web/status/1305787462166478848 | Attackerkb_Bot |
2020-09-15 08:30:09 | Un exploit est disponible sur la vulnérabilité CVE-2020-1472 (ZeroLogon). Le Cert-IST va émettre une alerte. https://t.co/zvGWrAYeei https://tinyurl.com/y3sbastr | cert_ist |
2020-09-15 08:30:03 | Arbeitstag 112 im #homeoffice: CVSS 10 incomming (CVE-2020-1472) update your DCs #patchyourshit https://t.co/0UmUdzYUYl | schwedenmut |
2020-09-15 08:20:07 | 🔥 ⚠ 🚨 CVE-2020-1472 (aka ZeroLogon) has just been added to Mimikatz... https://t.co/JHEUiTQClN https://twitter.com/gentilkiwi/status/1305659499991183361 | BushidoToken |
2020-09-15 08:20:04 | instantly become #domainadmin by subverting #Netlogon #cryptography (CVE-2020-1472) https://t.co/0m2ipqvY3Y https://buff.ly/2FCOc57 | beuchelt |
2020-09-15 08:10:07 | "Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)" via Lobsters 2020-09… https://t.co/tqMjXKt8RU https://twitter.com/i/web/status/1305779489973194753 | bot_devurls_com |
2020-09-15 08:10:06 | 🚨CVE-2020-1472 aka zerologon [https://t.co/Mxr9klTCPm] ⚠️☢️PoC⬇️ https://t.co/z47DTV1CfG https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks https://twitter.com/_dirkjan/status/1305552475890556932 | Decio_o_o |
2020-09-15 08:10:04 | CVE-2020-1472 (hay ya como 4 PoC activas y funcionales) + #ransomware al azar = Espero que tus #backups sean magníf… https://t.co/N3OzOFbO6Y https://twitter.com/i/web/status/1305780803297779712 | antoniosanzalc |
2020-09-15 08:00:04 | CVE-2020-1472 POC https://t.co/SLWSNnVirw https://github.com/dirkjanm/CVE-2020-1472/blob/master/restorepassword.py | Acardia2020 |
2020-09-15 07:50:10 | CVE-2020-1472 #Zerologon exploitini canlı sisteme denerken dikkat! :) "Do note that by default this changes the pas… https://t.co/GtpstMb0vq https://twitter.com/i/web/status/1305774297764556800 | ixmailsaygili |
2020-09-15 07:50:08 | @matthieugarin CVSS 7.8/10* pour la CVE-2020-1492, par contre c'est bien 10/10 pour la CVE-2020-1472 | Nathanael_Mtd |
2020-09-15 07:50:07 | Zerologon攻撃のMS側関連リソース: 「CVE-2020-1472 | Netlogon の特権の昇格の脆弱性」(MSRC , https://t.co/8Xb3j92Q14) 「[AD 管理者向け] CVE-2020-1… https://t.co/sidtHlCcAU https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2020-1472 https://twitter.com/i/web/status/1305775058736963584 | Tomoi_S |
2020-09-15 07:40:05 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472: https://t.co/3HlsX3Vpr0 #follow & #RT #cybersecurity #infosec https://ift.tt/3iw2wv3 | KeoXes |
2020-09-15 07:40:04 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/BxI4lXCEvd http://ow.ly/NW4g102myFm | Michal_Jarski |
2020-09-15 07:30:06 | ZeroLogon testing script (CVE-2020-1472) https://t.co/B0Sc1gljx8 https://ift.tt/3kjxmaA | bug_less |
2020-09-15 07:20:09 | ZDNet article on Zerologon CVE-2020-1472: https://t.co/BztIyZBmuy #zerologon #CVE20201472 #vulnerability #netlogon #patchnow #cybersecurity https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/ | SecuraBV |
2020-09-15 07:20:09 | threatmeter: Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 Original release date: September 14,… https://t.co/5RfujulG9D https://twitter.com/i/web/status/1305766491686662144 | SecurityMagnate |
2020-09-15 07:10:11 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 Original release date: September 14, 2020 The Cy… https://t.co/RDzgDWqLP1 https://twitter.com/i/web/status/1305764087192858626 | threatmeter |
2020-09-15 07:10:10 | Just for clarification: #Zerologon refers to CVE-2020-1472 and means that anyone with connectivity to a Domain Cont… https://t.co/96h10RygMt https://twitter.com/i/web/status/1305764184328671232 | qd285 |
2020-09-15 07:10:09 | ระวังภัย โค้ดโจมตีช่องโหว่ Zerologon (CVE-2020-1472) ถูกเผยแพร่แล้ว อาจถูกแฮกยึดเซิร์ฟเวอร์ได้ ควบรีบแพตช์ https://t.co/KevvIPIzKB https://www.thaicert.or.th/newsbite/2020-09-15-01.html#2020-09-15-01 | ThaiCERT |
2020-09-15 07:10:08 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/xC469MiwxY https://ift.tt/3iw2wv3 | cyberbuzznews |
2020-09-15 07:10:06 | The exploit code for the critical vulnerability in Netlogon Remote Protocol (CVE-2020-1472) is now publicly availab… https://t.co/51MEqKHmIN https://twitter.com/i/web/status/1305764930403139585 | CSAsingapore |
2020-09-15 07:10:04 | [Notice-CSA] The exploit code for the critical vulnerability in Netlogon Remote Protocol (CVE-2020-1472) is now pub… https://t.co/Rrp9eyAKOQ https://twitter.com/i/web/status/1305765175593594881 | SG_Alerts |
2020-09-15 06:40:04 | I love how everyone's making their own POC for Zerologon (CVE-2020-1472) its fun to see people add their little spin on things | olivier_boschko |
2020-09-15 06:40:04 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/Xo9whrm8nt https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | oha000 |
2020-09-15 06:40:03 | #Zerologon CVE-2020-1472 with a score of 10, is one of the most dangerous attacks of all times where one can instan… https://t.co/VD3mNRSssM https://twitter.com/i/web/status/1305758186872492040 | Nawdiral |
2020-09-15 06:30:11 | Zerologon (CVE-2020-1472, CVSS 10) attack lets hackers take over enterprise networks: Patch now Microsoft patches o… https://t.co/N8xVtfwAUM https://twitter.com/i/web/status/1305754353601568769 | argevise |
2020-09-15 06:30:03 | Zerologon: PoC exploit CVE-2020-1472 ya disponible (CVSS 10.0) https://t.co/ptyJsT813z https://nuevoperiodico.com/el-nuevo-exploit-de-windows-le-permite-convertirse-instantaneamente-en-administrador-has-parcheado/ | jandres_casado |
2020-09-15 06:20:07 | @gentilkiwi CVE-2020-1472 I presume? | RemkoWeijnen |
2020-09-15 06:20:05 | Without sharing the details behind the shocking #vulnerability CVE-2020-1472, #Microsoft patched one of the most se… https://t.co/MOiGKJEYHu https://twitter.com/i/web/status/1305752627762860032 | The_Proc |
2020-09-15 05:50:05 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) Patch available and to… https://t.co/y9hilGyUIW https://twitter.com/i/web/status/1305744763212234752 | stratechno |
2020-09-15 05:40:04 | Windows updates available for CVE-2020-1472: Netlogon Elevation of Privilege Vulnerability. The vulnerability in al… https://t.co/E4kWp5vr8K https://twitter.com/i/web/status/1305742816480559105 | circl_lu |
2020-09-15 05:30:06 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/1CDhpfat2m https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | madaodasu |
2020-09-15 05:10:06 | Zerologon CVE-2020-1472 POC https://t.co/iz1rJtBczP https://github.com/dirkjanm/CVE-2020-1472 | Cyber_O51NT |
2020-09-15 05:10:05 | CVE-2020-1472について、イベントログを監視すること、KBに書いているんだけど、そもそもパッチを当てないとでないので、そこんとこ夜露死苦。 いや、とっととあてるべきよ。こういうのは。 | papa_anniekey |
2020-09-15 05:10:03 | New post: CVE-2020-1472:NetLogon特权提升漏洞通告 https://t.co/U4KrIHH3UQ:netlogon特权提升漏洞通告-2/ https://reportcybercrime.com/cve-2020-1472 | digitpol_cyber |
2020-09-15 05:00:04 | CVE-2020-1472のパッチ、定例サイクルに組み込まれて緊急でパッチしない組織って結構あるんかな… DCは外からアクセスできないから通常対応って言われたわ | Sushibar4649 |
2020-09-15 05:00:03 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/Xo9whrDJM3 https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | oha000 |
2020-09-15 04:50:10 | ---2020 年 9 月 15 日 更新--- CVE-2020-1472 について、攻撃コードが公開されているとの情報が公表されています。 攻撃が行われた場合の影響が大きいため、2020 年 8 月のセキュリティ更新プログラム… https://t.co/WtGPQ5mvgX https://twitter.com/i/web/status/1305728440268591111 | taku888infinity |
2020-09-15 04:50:06 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/hF5WjZZrL2 https://twitter.com/i/web/status/1305729870266347520 | ptracesecurity |
2020-09-15 04:40:03 | @symantec @Broadcom @NortonLifelock CVE-2020-1472 | alex37301356 |
2020-09-15 04:30:06 | New post: 【安全通报】Microsoft NetLogon远程特权提升漏洞(CVE-2020-1472)通告 https://t.co/gtwdPGBsrt【安全通报】microsoft-netlogon远程特权提升漏洞(cve-2020-1472)通告/ https://reportcybercrime.com/ | digitpol_cyber |
2020-09-15 04:30:04 | #Zerologon (CVE-2020-1472), the most insane #vulnerability ever! Domain Admin privileges immediately from unauthent… https://t.co/qboaOSXOrW https://twitter.com/i/web/status/1305724968966254592 | glivada |
2020-09-15 04:20:06 | 脆弱性「Zerologon」でドメイン管理者権限奪取のおそれ - 詳細明らかに https://t.co/BCWYDs3lSy 『「CVE-2020-1472」は、ドメイン管理者権限を取得可能となる脆弱性。同脆弱性を発見し、マイ… https://t.co/oy9peAI1cV https://www.security-next.com/118464 https://twitter.com/i/web/status/1305721803499692032 | taku888infinity |
2020-09-15 04:10:08 | From @wdormann : I can confirm that this public exploit for Zerologon (CVE-2020-1472) works. Anybody who has not i… https://t.co/D5BHDGsYcY https://twitter.com/i/web/status/1305718834712711168 | argevise |
2020-09-15 04:00:10 | Vulnérabilité Critique Microsoft « Netlogon » CVE-2020-1472 CVSS 10, merci bcp Chafik (Chafik Mohamed ) pour ces é… https://t.co/B2yJ5Ey4dl https://twitter.com/i/web/status/1305715625550123010 | argevise |
2020-09-15 04:00:08 | 1ヶ月遅れのCVE-2020-1472 | fate_fox |
2020-09-15 03:40:07 | ゆりか先生がBlogを書いてくれました。 予想通り、非WindowsデバイスのNetlogon実装みたいですね。 イベントログでエラー確認しメーカーに連絡し対応ですね。 [AD 管理者向け] CVE-2020-1472 Netlo… https://t.co/rrBriwTzFT https://twitter.com/i/web/status/1305711576645685249 | ripjyr |
2020-09-15 03:40:05 | [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/yFvmutjWJB https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | ka0com |
2020-09-15 03:30:09 | Active Directory 管理者向けに CVE-2020-1472 Netlogon の脆弱性の概要と、必要となる作業の概要をセキュリティ チーム ブログにて公開しています。 https://t.co/1npkV1aTmu https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ | JSECTEAM |
2020-09-15 03:30:07 | これが厄介『非 Windows OS の場合は、Netlogon 実装が Secure RPC に対応するよう更新する必要があります』:[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 -… https://t.co/SWP1aXS4s9 https://twitter.com/i/web/status/1305708951699255298 | tamosan |
2020-09-15 03:30:05 | Active Directory 管理者向けに、本脆弱性の概要と必要となる作業の概要の解説ブログを出しました。ぜひご参照いただき、早めの対処のご検討をおねがいします → [AD 管理者向け] CVE-2020-1472 Netlo… https://t.co/SvJWUQDQLO https://twitter.com/i/web/status/1305709512603529225 | EurekaBerry |
2020-09-15 03:30:04 | อย่าลืมทำ Windows Update กันนะครับ ตัว CVE-2020-1472 มีเครื่องมือใช้โจมตีออกมาแล้ว อ้อ...ยังไงก็อย่าลืมเทสก่อนขึ้น… https://t.co/uLM2IomTeW https://twitter.com/i/web/status/1305710237161328641 | idomez |
2020-09-15 03:30:03 | Zerologon攻撃、未認証でDC管理者権限を取得されるリスク。CVSSスコア10の深刻な脆弱性 https://t.co/zPFsBtLSHN Zerologon(CVE-2020-1472)はこれかー https://news.yahoo.co.jp/byline/ohmototakashi/20200915-00198345/ | flano_yuki |
2020-09-15 03:20:06 | From @Wormable : I can confirm that this public exploit for Zerologon (CVE-2020-1472) works. Anybody who has not i… https://t.co/by7P72pt44 https://twitter.com/i/web/status/1305707080838533120 | argevise |
2020-09-15 03:20:06 | Exploit for Critical Vulnerability #CVE-2020-1472 in #Microsoft’s Netlogon is available publicly that lets any unau… https://t.co/OCcZnyJb06 https://twitter.com/i/web/status/1305706447473262593 | NCIIPC |
2020-09-15 03:11:24 | CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know - https://t.co/LFPocaiRks #Hacking… https://t.co/vAVoJJLcWo https://www.redpacketsecurity.com/cve-2020-1472-zerologon-critical-privilege-escalation-what-you-need-to-know/ https://twitter.com/i/web/status/1305658018177130498 | RedPacketSec |
2020-09-15 03:10:06 | New Windows exploit lets you instantly become admin. Have you patched? CVE-2020-1472, as the vulnerability is tra… https://t.co/t1Hq8OynqI https://twitter.com/i/web/status/1305703140847689729 | _therealmark_ |
2020-09-15 02:50:04 | 8/11にはCVSSスコアを設定していたと書いてあるが10だったら1ヶ月後の今になって話題になるわけないだろ… CVE-2020-1472 | Netlogon の特権の昇格の脆弱性 https://t.co/NZ4qzIS36A https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2020-1472 | Sushibar4649 |
2020-09-15 02:50:03 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/fVuc6Wpyis #uscert #gov https://buff.ly/3kgTsul | NotTruppi |
2020-09-15 02:20:05 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/ahI9n8iEwr https://www.secura.com/blog/zero-logon | hiropooh |
2020-09-15 02:10:07 | A new vulnerability was disclosed late last week with a critical vulnerability called zerologin (CVE-2020-1472), th… https://t.co/Pn81vXnj1y https://twitter.com/i/web/status/1305688937315184640 | Bl4ck0p |
2020-09-15 02:00:08 | Zerologon (CVE-2020-1472)、試してみたけどやばすぎて笑った https://t.co/pWHjfvEQ5D | shutingrz |
2020-09-15 01:50:06 | 8月修正「Windows Server」の脆弱性狙う悪用コードが公開 - 米政府警告:Security NEXT ✔︎CVE-2020-1472の攻撃コードが公開 ✔︎MS-NRPCを使用してドメインコントローラーと脆弱な接続… https://t.co/fONU9c568Z https://twitter.com/i/web/status/1305682947043807238 | _spxn |
2020-09-15 01:50:05 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 | CISA https://t.co/E4Nl0WEr6s https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | _spxn |
2020-09-15 01:40:05 | 【セキュリティ ニュース】8月修正「Windows Server」の脆弱性狙う悪用コードが公開 - 米政府警告 https://t.co/SbffjYsWUc 『「CVE-2020-1472」は、「Windows Server」に明らかとなった脆弱性。』 https://www.security-next.com/118455 | taku888infinity |
2020-09-15 01:40:04 | CVE-2020-1472 のExploitをとりあえず試してこようかな。今日ペンテストある人とか捗りそう? | sen_u |
2020-09-15 01:40:03 | New post: [更新1.0|PoC公开]CVE-2020-1472: NetLogon特权提升漏洞通告 – 360CERT https://t.co/gtwdPGBsrt更新1-0poc公开cve-2020-1472-netlogon特权提升漏洞通告-360cert/ https://reportcybercrime.com/ | digitpol_cyber |
2020-09-15 01:20:08 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/FB1f1gmDFz https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | Pyo0072 |
2020-09-15 01:20:07 | CVE-2020-1472 is really juicy. I like it because it’s another digital transformation driver. | notameadow |
2020-09-15 01:20:06 | Technical details of CVE-2020-1472 Zerologon https://t.co/ZOcfblezGl https://www.secura.com/pathtoimg.php?id=2055 | 1nf0s3cpt |
2020-09-15 01:00:05 | 確かに書いてある。 期限がゆりか先生のお告げで、2021年2月確定っぽい。 --- CVE-2020-1472 | Netlogon の特権の昇格の脆弱性 → https://t.co/59F17julnO https://t.co/6hdgG8t5H4 https://bit.ly/3hD0Sqk | ripjyr |
2020-09-15 01:00:04 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 - https://t.co/5HrXX8q7t8 https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | ka0com |
2020-09-15 01:00:04 | CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 https://t.co/e0UFewlG8F https://support.microsoft.com/ja-jp/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | naka_mura_masa |
2020-09-15 01:00:03 | CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 → https://t.co/YHLvt79HuY https://bit.ly/3hxCBSc | ripjyr |
2020-09-15 00:50:07 | » Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 | CISA https://t.co/11iOMJZTG0 https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | yuuyuyu_ka |
2020-09-15 00:50:06 | CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know - https://t.co/NUr4JGi0PA https://blog.rapid7.com/2020/09/14/cve-2020-1472-zerologon-critical-privilege-escalation/ | ka0com |
2020-09-15 00:50:05 | CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller - https://t.co/oasuTDTp5y https://www.tenable.com/blog/cve-2020-1472-zerologon-vulnerability-in-netlogon-could-allow-attackers-to-hijack-windows | ka0com |
2020-09-15 00:50:04 | New post: CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/4tkrG0IIU2 https://reportcybercrime.com/cve-2020-1472-zerologon-critical-privilege-escalation-what-you-need-to-know/ | digitpol_cyber |
2020-09-15 00:30:07 | https://t.co/80tN6Wjtb7 CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Window… https://t.co/gaxpRD7tv4 https://www.tenable.com/blog/cve-2020-1472-zerologon-vulnerability-in-netlogon-could-allow-attackers-to-hijack-windows https://twitter.com/i/web/status/1305662642720313344 | netsecu |
2020-09-15 00:20:03 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/bPg5vomR1j https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | thalles |
2020-09-15 00:10:09 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/nJHbs6X5tm https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | microkeyword |
2020-09-15 00:00:07 | CVE-2020-1472 - unauthenticated priv esc to DA, MS patch released in August, exploit code now public. https://t.co/FW8k2ejR6a https://arstechnica.com/information-technology/2020/09/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched/ | ShannonTony |
2020-09-15 00:00:06 | GitHub - dirkjanm/CVE-2020-1472: PoC for Zerologon - all research credits go to Tom Tervoort of Secura - https://t.co/73SFzgLLE3 https://github.com/dirkjanm/CVE-2020-1472 | piedpiper1616 |
2020-09-15 00:00:06 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 - https://t.co/gr8TyiwwEE https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | moton |
2020-09-14 23:40:09 | Rapid7 Blog | CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/zXIdmJU0nG https://bit.ly/3hxeAuu | StopMalvertisin |
2020-09-14 23:40:06 | #Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/NUmDFjoBS1 https://twitter.com/i/web/status/1305650913084932096 | deepwatch_sec |
2020-09-14 23:20:05 | 🤔Utilisateur non authentifié <i>curieux</i> 🢂 😎Domain Admin. Bim. Just like that. "Zerologon" CVE-2020-1472 (patché… https://t.co/d2z4sTIuBA https://twitter.com/i/web/status/1305646517949169664 | serma_nes_watch |
2020-09-14 23:20:03 | There are multiple confirmed working exploits for CVE-2020-1472 on Github, which drop domain admin access with simp… https://t.co/8gGNIiH5uR https://twitter.com/i/web/status/1305646985337352192 | GossiTheDog |
2020-09-14 23:00:11 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/HUVXFxUeRO http://dlvr.it/RgcFJf | amolsarwate |
2020-09-14 22:50:19 | Important! Public exploits for CVE-2020-1472 make it a real threat to all unpatched domain controllers. Any attacke… https://t.co/7gHaB8JJS1 https://twitter.com/i/web/status/1305638204830355457 | fabio_viggiani |
2020-09-14 22:40:08 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/ilekjXi4EU #infosec https://www.secura.com/blog/zero-logon | allaboutclait |
2020-09-14 22:40:05 | The Zerologon (CVE-2020-1472) is a crazy vulnerability!! Worm is coming!! https://t.co/VW7x4ySs9g #Zerologon #appsec #CyberSecurity #infosec https://www.secura.com/blog/zero-logon | simonroses |
2020-09-14 22:10:06 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/SkJVAyPXSQ https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | Sec_Cyber |
2020-09-14 22:10:05 | CVE-2020-1472: PoC for Zerologon - all research credits go to Tom Tervoort of Secura https://t.co/xyQvid1dEL #Python https://github.com/dirkjanm/CVE-2020-1472 | JekiCode |
2020-09-14 22:00:12 | #infosec Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/dwE9OFSCe5 https://ift.tt/3iw2wv3 | jeffreydbrown |
2020-09-14 22:00:11 | I have updated this article to add that a PoC for the Zerologon (CVE-2020-1472) vulnerability is now available onli… https://t.co/Qp4QXnbt3l https://twitter.com/i/web/status/1305625403361497088 | campuscodi |
2020-09-14 22:00:09 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/w62FdXMnTa CVE-2020-1472 | Netlogo… https://t.co/UYslkMd3aH https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 https://twitter.com/i/web/status/1305625907101536256 | nekochanSec555 |
2020-09-14 22:00:08 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/MW8vBPts0G https://twitter.com/i/web/status/1305626260308074496 | nekochanSec555 |
2020-09-14 21:50:04 | Zerologon, or CVE-2020-1472, is a critical CVSS10 vulnerability that allows malicious actors to impersonate the ide… https://t.co/6n7aRDELpd https://twitter.com/i/web/status/1305624202758615040 | AutomoxApp |
2020-09-14 21:40:07 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 | CISA https://t.co/pmrooTAZRk https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 | _T_MKI |
2020-09-14 21:30:18 | Si tu organización trabaja con #Netlogon, ¡actualiza ahora! 📡 Nombre: #Zerologon 📡 ID: CVE-2020-1472 📡 CVSSv3: 10.… https://t.co/5gNUVkFJsH https://twitter.com/i/web/status/1305617369780441088 | Cronup_CyberSec |
2020-09-14 21:30:17 | CISA is aware of publicly available exploit code for CVE-2020-1472, an elevation of privilege vulnerability in Micr… https://t.co/zmW6ZaBikF https://twitter.com/i/web/status/1305617882085113857 | RRalstonAgile |
2020-09-14 21:30:14 | 🚨 CVE-2020-1472 | CVSSv3: 10.0 🚨 ¡Llego la hora de actualizar si tu organización trabaja con #NetLogon! https://t.co/glj3Ilel7k https://twitter.com/Cronup_CyberSec/status/1305617369780441088 | LixaH_CL |
2020-09-14 21:30:11 | Zerologon, or CVE-2020-1472, is a critical CVSS10 #vulnerability that allows malicious actors to impersonate the id… https://t.co/uSvNCTnaS2 https://twitter.com/i/web/status/1305618596727525377 | AutomoxApp |
2020-09-14 21:30:11 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 CISA is aware of publicly available exploit code… https://t.co/vkB90C0VcG https://twitter.com/i/web/status/1305618593065783296 | z3roTrust |
2020-09-14 21:20:13 | Remember to patch CVE-2020-1472—an elevation of privilege vulnerability in Microsoft’s Netlogon. Read more at… https://t.co/ucq1Y9pDNV https://twitter.com/i/web/status/1305615321244598275 | USCERT_gov |
2020-09-14 21:20:12 | #zerologon CVE-2020-1472, time to patch your DC ;) | t0nynja |
2020-09-14 21:20:06 | CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/p0Bqip3CS9 https://twitter.com/i/web/status/1305616063896322048 | RiskSense |
2020-09-14 21:10:08 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472: Original release date: September 14, 2020 The… https://t.co/Xv2WUaCyu6 https://goo.gl/fb/szB1s9 | threatmeter |
2020-09-14 21:10:03 | #Snort rule to detect potential exploitation attempts of #CVE-2020-1472 https://t.co/jo5gfUTaf5 #zerologon #infosecurity https://raw.githubusercontent.com/bhdresh/SnortRules/master/Exploit/CVE-2020-1472.rules | bhdresh |
2020-09-14 21:10:03 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/fRbsrtUeNm https://www.itsecuritynews.info/exploit-for-netlogon-remote-protocol-vulnerability-cve-2020-1472/ | IT_securitynews |
2020-09-14 21:00:06 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/De3y8koIf3 #uscert #security https://bit.ly/2FsjAUo | ATTOGTech |
2020-09-14 20:50:17 | New post: Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/Lw675O7xUj https://reportcybercrime.com/exploit-for-netlogon-remote-protocol-vulnerability-cve-2020-1472/ | digitpol_cyber |
2020-09-14 20:40:10 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/NMa78SO5Dt #cert #security https://bit.ly/2FsjAUo | SiciliamConsult |
2020-09-14 20:40:09 | Oh my, CVE-2020-1472 is a real hoot. :/ https://t.co/M57bjPdow0 https://twitter.com/halvarflake/status/1305523566914527237 | Kensan42 |
2020-09-14 20:40:07 | Publicly available exploit code for CVE-2020-1472: elevation of privilege vulnerability in Microsoft Netlogon. Alth… https://t.co/4oLigR1SYl https://twitter.com/i/web/status/1305606051551612929 | holisticinfosec |
2020-09-14 20:40:06 | Actualicen sus DC's Una de las vulnerabilidades más críticas que he visto en mucho tiempo. CVE-2020-1472 https://t.co/yyQwI0ax7t | JulioUrena |
2020-09-14 20:30:13 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/xcTp22ADtQ https://sl.advdat.com/32tAFWy | ADVDAT_OH |
2020-09-14 20:30:09 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472https://us-cert.cisa.gov/ncas/current-activity/202… https://t.co/V9bwC2ScnB https://twitter.com/i/web/status/1305603374604341249 | gregoryfarley |
2020-09-14 20:30:09 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/EQdJpDZ0mQ https://www.secura.com/blog/zero-logon | atlas7io |
2020-09-14 20:20:11 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/ywQYmRtuCW via @USCERT_gov http://dlvr.it/RgbsVz | AcooEdi |
2020-09-14 20:20:11 | @damianzaremba Pretty sure that's the sound of CVE-2020-1472 😂 | IISResetMe |
2020-09-14 20:20:05 | CERT Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/MIeIvnVKGF https://bit.ly/3bX5AOh | PAUL_CSFI |
2020-09-14 20:20:04 | Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/v8Fc5v6KZD https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472?utm_source=dlvr.it&utm_medium=twitter | RigneySec |
2020-09-14 20:00:09 | RiskSense will be releasing a weaponized exploit for CVE-2020-1472, aka Zerologon, later today. Stay tuned. #zerologon | RiskSense |
2020-09-14 19:50:07 | Zerologon (CVE-2020-1472): 100% reliable Domain Admin privileges immediately from unauthenticated network access to… https://t.co/JONb8DHam0 https://twitter.com/i/web/status/1305593809707958275 | an0n_r0 |
2020-09-14 19:50:06 | Teaching today and just saw @campuscodi post on #ZeroLogin CVE-2020-1472. Shout out to all the system admins that… https://t.co/GukH7ZHQZY https://twitter.com/i/web/status/1305594114784874496 | jorgeorchilles |
2020-09-14 19:40:07 | Got all caught up in the hype of CVE-2020-1472 (Zerologon), wrote my own PoC to integrate with secretsdump and psex… https://t.co/O9aD5w8WyH https://twitter.com/i/web/status/1305590444059959299 | 0xbb00 |
2020-09-14 19:40:04 | CVE-2020-1472 is no joke. I just tested the exploit code, ran secretsdump to dcsync and had my test domain hashes in like 2 minutes. | frcolumba |
2020-09-14 19:30:07 | Zerologon (CVE-2020-1472) POC: "Do note that by default this changes the password of the domain controller account… https://t.co/eGIG2sN7YY https://twitter.com/i/web/status/1305588484116279301 | vulmoncom |
2020-09-14 19:20:11 | Can anyone confirm a PoC for CVE-2020-1472 @strandjs @security_score @msftsecurity | abunooorrr |
2020-09-14 19:20:10 | Why, hello there CVE-2020-1472 | notsoevilweasel |
2020-09-14 19:20:09 | CVE-2020-1472. Vienen curvas, si no, tiempo al tiempo. | luixtao |
2020-09-14 19:20:02 | If you're out here exploiting Zerologon (CVE-2020-1472) on a DC, do yourself and your clients a favor and change th… https://t.co/kAJtGh566W https://twitter.com/i/web/status/1305586894424518656 | The_Naterz |
2020-09-14 19:00:13 | What's CVE-2020-1472? It's An elevation of privilege vulnerability exists when an attacker establishes a vulnerable… https://t.co/Gs5iidQ1aT https://twitter.com/i/web/status/1305580481090670592 | Ke_Cyber |
2020-09-14 19:00:12 | by running this Python script it will test vulnerability for the Zerologon exploit (CVE-2020-1472). ./zerologon_te… https://t.co/1cxInMb5fH https://twitter.com/i/web/status/1305580485116977152 | Ke_Cyber |
2020-09-14 19:00:10 | This is bad.. CVE-2020-1472 https://t.co/bbTgAR1VfB https://www.secura.com/pathtoimg.php?id=2055 | infosec_4life |
2020-09-14 18:40:07 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/aCWQQ6ZrB2 https://www.secura.com/blog/zero-logon | johannsmith |
2020-09-14 18:40:06 | https://t.co/85p3ysfDxX Another PoC for CVE-2020-1472. I modified @SecuraBV 's scanner, Stage 2 with the password r… https://t.co/4wI8D6Ia9M https://github.com/b4cktr4ck2/CVE-2020-1472/blob/master/exp.py https://twitter.com/i/web/status/1305575954706845696 | b4cktr4ck2 |
2020-09-14 18:40:04 | The race for Zerologon (CVE-2020-1472) has begun, I can confirm public exploits are working😬 Details from Microsoft… https://t.co/DJRuYpbUQT https://twitter.com/i/web/status/1305576642782343170 | pentest_swissky |
2020-09-14 18:30:11 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-14 18:00:08 | Parece que este CVE-2020-1472 promete ser interesante. Convertirse en Domain Admin atacando al Netlogon. ¡Hay que… https://t.co/0FBr43tbuc https://twitter.com/i/web/status/1305564978603266051 | manelrodero |
2020-09-14 18:00:03 | CVE-2020-1472 kodu ile yayınlanan ve Domain Controller’lar üzerinde yetkisiz kod çalıştırmaya imkan tanıyan kritik… https://t.co/nVIshWDcJ3 https://twitter.com/i/web/status/1305566561873387526 | emrahkocabuga |
2020-09-14 17:50:09 | CVE-2020-1472: PoC for Zerologon https://t.co/ubjlAGcIQD https://github.com/dirkjanm/CVE-2020-1472 | jedisct1 |
2020-09-14 17:50:07 | 10 saniyede DC'yi ele geçirebilen yeni zafiyet CVE-2020-1472 https://t.co/rdQUFNWUMH https://www.secura.com/blog/zero-logon | berk_imran |
2020-09-14 17:50:05 | Yeah, I can confirm that this public exploit for Zerologon (CVE-2020-1472) works. Anybody who has not installed th… https://t.co/R7AQ75MZDV https://twitter.com/i/web/status/1305564045282598912 | wdormann |
2020-09-14 17:30:13 | ma boi @cube0x0 made a POC for CVE-2020-1472 (Zerologon) GJ dude! https://t.co/VhY2wK3gIK https://twitter.com/cube0x0/status/1305552726663856134 | WhortonMr |
2020-09-14 17:20:12 | Really CVE-2020-1472?! This is kicking my ass 😭 | HersdayAtoms |
2020-09-14 17:20:06 | 0-Domain Admin in 10 seconds with Zerologon (CVE-2020-1472) Using @_dirkjan 's NetrServerPasswordSet2 commit to im… https://t.co/JXmPKNDvuK https://twitter.com/i/web/status/1305556202974334983 | buffaloverflow |
2020-09-14 17:20:05 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/fHRj7U4mfq https://www.secura.com/blog/zero-logon | m2htd |
2020-09-14 17:10:10 | exploit POC for CVE-2020-1472 (Zerologon: instantly become domain admin by subverting Netlogon cryptography) https://t.co/xBHt2x56Ws https://github.com/cube0x0/CVE-2020-1472 | cube0x0 |
2020-09-14 17:00:07 | Zerologon: Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/lGc71vHeCQ https://ift.tt/2H06TAF | eyalestrin |
2020-09-14 16:40:09 | CVE-2020-1472: Zerologon https://t.co/SAm7ZG5IV1 https://github.com/blackarrowsec/redteam-research/tree/master/CVE-2020-1472 | nilssonanders |
2020-09-14 16:40:08 | Zerologon attack allows threat actors to take over enterprise networks by exploiting the CVE-2020-1472 patched in t… https://t.co/1f14I9tqS7 https://twitter.com/i/web/status/1305545159329816584 | iamTdivyesh |
2020-09-14 16:30:03 | So for CVE-2020-1472. (Netlogon Vulnerability) Is there any other remediations that can take place to protect Dom… https://t.co/4rfDQGSzum https://twitter.com/i/web/status/1305544177640443913 | blueteamblog |
2020-09-14 16:30:02 | This weekend we've been working in a #Zerologon exploit (CVE-2020-1472), check it out! #redteam https://t.co/I9GpZXZEir https://twitter.com/BlackArrowSec/status/1305524479397900289 | xassiz |
2020-09-14 16:20:08 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/tPsJa7GwGn https://www.secura.com/blog/zero-logon | EVarjus |
2020-09-14 16:20:04 | Unauth #RCE for Domain Controllers #Zerologon (CVE-2020-1472): Unauthenticated user to Domain Admin. DCSync with DC… https://t.co/RuBLZgGpmq https://twitter.com/i/web/status/1305541315145465857 | sky31337 |
2020-09-14 16:10:09 | CVE-2020-1472 reproduced #zerologon vulnerability! It's an unauth RCE for Domain Controllers. What next https://t.co/ogv0SnL1yr https://dirteam.com/sander/2020/08/11/knowledgebase-you-experience-warnings-with-eventid-5829-on-domain-controllers/ | OKoreev |
2020-09-14 16:00:07 | [WARNING| #zerologon (CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE exploit the wil… https://t.co/C2XSI4J9t4 https://twitter.com/i/web/status/1305535416255291392 | ToolsWatch |
2020-09-14 16:00:07 | [WARNING| #zerologon (CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE exploit the wil… https://t.co/6HKXmHlbJO https://twitter.com/i/web/status/1305535281655885825 | vFeed_IO |
2020-09-14 15:50:04 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/9hj64DXyPD https://www.secura.com/blog/zero-logon | MasafumiNegishi |
2020-09-14 15:30:11 | ZeroLogon testing script (CVE-2020-1472) https://t.co/ahJ1ati11i #ZeroLogon #infosec #cve #security #hacking #anonymous https://cyberwarzone.com/zerologon-testing-script-cve-2020-1472/ | Cyberwarzonecom |
2020-09-14 15:20:11 | PoC for #Zerologon vulnerability (CVE-2020-1472) which could allow us to carry out an unauthenticated Domain Contro… https://t.co/UzRvRF8qoM https://twitter.com/i/web/status/1305524479397900289 | BlackArrowSec |
2020-09-14 15:20:10 | Technical details of CVE-2020-1472 Zerologon https://t.co/Jy9V6NGY1K #appsec #security #secops https://ift.tt/3ixrWbB | rtcz_io |
2020-09-14 15:20:06 | 🔥#CVE-2020-1472 Netlogon Elevation of Privilege Vulnerability (All in One) ➡️[BLOG]:https://t.co/1mtrFlopdK ➡️[PoC… https://t.co/3MJYkOU7gq http://secura.com/blog/zero-logon https://twitter.com/i/web/status/1305526050051502082 | rimpq |
2020-09-14 15:20:04 | ZeroLogon testing script (CVE-2020-1472) https://t.co/ahJ1ati11i #infosec #security #hacking #secura #zerologon #test #ciso #argg https://cyberwarzone.com/zerologon-testing-script-cve-2020-1472/ | Cyberwarzonecom |
2020-09-14 15:10:03 | PoC for #Zerologon vulnerability (CVE-2020-1472) which could allow us to carry out an unauthenticated Domain Contro… https://t.co/2m790jfaEm https://twitter.com/i/web/status/1305524062135955456 | BlackArrowSec |
2020-09-14 15:00:12 | Domain-Controller-Übernahme aus dem internen Netz: Mehr Details zu CVE-2020-1472 https://t.co/DoHHVD3XmZ https://cert.at/de/aktuelles/2020/9/domain-controller-ubernahme-aus-dem-internen-netz-mehr-details-zu-cve-2020-1472 | CERT_at |
2020-09-14 15:00:05 | ミテマスヨー: [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/UbVf1YzBYl https://www.secura.com/blog/zero-logon | madaodasu |
2020-09-14 14:50:21 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/85XgVSb541 https://twitter.com/i/web/status/1305516670459363328 | autumn_good_35 |
2020-09-14 14:50:19 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/fZWXLVNtMq https://www.secura.com/blog/zero-logon | ohhara_shiojiri |
2020-09-14 14:50:17 | Top story: [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/y51Ef6Osri https://twitter.com/i/web/status/1305517532909056005 | securitycrusade |
2020-09-14 14:40:10 | https://t.co/LUB62n4vUw Hackers can take control of corporate networks using Zerologon vulnerability CVE-2020-1472… https://t.co/xYc2foIFOj https://www.secura.com/blog/zero-logon https://twitter.com/i/web/status/1305515055790858245 | Zanket_com |
2020-09-14 14:30:08 | Trending News: [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/CuIpvTrfsd https://twitter.com/i/web/status/1305512484804190209 | susession |
2020-09-14 14:30:07 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/0KrjbJtuHY https://nzzl.us/WgKBmSE | khaos_farbauti |
2020-09-14 14:20:12 | ナニコレヒドイ / “Dirk-jan on Twitter: "So yes, Zerologon (CVE-2020-1472) is quite easy to exploit. Unauthenticated user t… https://t.co/PjUqK5aKCO https://twitter.com/i/web/status/1305509239524265985 | waiha8 |
2020-09-14 14:10:13 | Test tool for #CVE-2020-1472 (DC auth bypass) https://t.co/HAiaRJHBLh https://github.com/SecuraBV/CVE-2020-1472 | WilfridBlanc |
2020-09-14 14:10:10 | CVE-2020-1472 | Netlogon の特権の昇格の脆弱性 https://t.co/ICnfELAJzo https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2020-1472 | push_back |
2020-09-14 14:10:09 | Zerologon: instantly become domain admin by subverting #Microsoft Netlogon cryptography (CVE-2020-1472)… https://t.co/l0GkAVPV6Z https://twitter.com/i/web/status/1305507604488171523 | sgoudswaard |
2020-09-14 14:00:15 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/WPtU325FjT http://hrbt.us/212262 | hardreboot |
2020-09-14 14:00:14 | CVE-2020-1472 の Zerologon と来たら Mimikatz に取り込まれても不思議ではないですがさてどうなりますかね | 0x009AD6_810 |
2020-09-14 14:00:14 | Technical details of CVE-2020-1472 Zerologon https://t.co/ysWUlDuKjU http://hrbt.us/212264 | hardreboot |
2020-09-14 14:00:12 | New post: "Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)" https://t.co/2eaTDtVaJ4 https://ift.tt/2FzG85g | Myinfosecfeed |
2020-09-14 14:00:09 | I will wait NetrServerPasswordSet2 to be implemented in impacket. :-) CVE-2020-1472 | w3bd3vil |
2020-09-14 14:00:04 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/X9U6UX5DSN https://www.secura.com/blog/zero-logon | _r_netsec |
2020-09-14 13:40:04 | CVE-2020-1472 #zerologon https://t.co/NJgTNXKgLj | scriptjunkie1 |
2020-09-14 13:30:05 | とにかく、8月の定例パッチで提供されたこの CVE-2020-1472 への修正 https://t.co/mSSQqtzeOu は適用しておかないとヤバいと思います😨 https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2020-1472 | 0x009AD6_810 |
2020-09-14 13:00:11 | New post: "Technical details of CVE-2020-1472 Zerologon" https://t.co/M2QkRG6nZN https://ift.tt/32qX8Uc | Myinfosecfeed |
2020-09-14 13:00:04 | Technical details of CVE-2020-1472 Zerologon https://t.co/OB874KlsnH https://www.secura.com/pathtoimg.php?id=2055 | _r_netsec |
2020-09-14 12:40:15 | [ALERT] The Zerologon (CVE-2020-1472) whitepaper is released https://t.co/R4G60C9Ehw please take this seriously and patch your AD! https://www.secura.com/blog/zero-logon | douglasmun |
2020-09-14 12:40:12 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/LPiJI1mFRN https://twitter.com/i/web/status/1305484812749352960 | ReneRobichaud |
2020-09-14 12:30:03 | Some more technical details of CVE-2020-1472 have been released. Press coverage: https://t.co/2hzkH8kQVR Nerd dee… https://t.co/VkzPXUdhO2 https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/ https://twitter.com/i/web/status/1305483822025322497 | GossiTheDog |
2020-09-14 12:20:09 | We have reproduced the CVE-2020-1472 #zerologon vulnerability! It's an unauth RCE for Domain Controllers. https://t.co/qFe45O7WPR | ptswarm |
2020-09-14 12:20:05 | Braced for arguments over whether CVE-2020-1472 was intended as a bugdoor. Even if not deliberately designed it see… https://t.co/rqTSprz5K5 https://twitter.com/i/web/status/1305481008872148996 | HostileSpectrum |
2020-09-14 12:10:10 | So yes, Zerologon (CVE-2020-1472) is quite easy to exploit. Unauthenticated user to Domain Admin. This is really sc… https://t.co/UuVCr9C3Gh https://twitter.com/i/web/status/1305476492386861059 | _dirkjan |
2020-09-14 12:00:03 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/Dp5DnphCch https://www.secura.com/blog/zero-logon?s=09 | AigarK |
2020-09-14 11:50:04 | CVE-2020-1472 Get to patching this if you have not already done so! #netlogon #CVSS10 https://t.co/hHDvz9vfa4 https://twitter.com/SecuraBV/status/1305450107391938561 | d4rkshell |
2020-09-14 11:50:03 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) "The vulnerability st… https://t.co/ETf9pf3qO0 https://twitter.com/i/web/status/1305472465200713728 | nilssonanders |
2020-09-14 11:20:04 | A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit (CVE-2020-1472). Gi… https://t.co/VfrtkAwvn1 https://twitter.com/i/web/status/1305465486373724162 | infosecwar |
2020-09-14 10:40:05 | NEW: paper describing details of CVE-2020-1472 aka #Zerologon (CVSSv3: 10), unauth. Windows DC pwning by subverting… https://t.co/uEBvd1KKv5 https://twitter.com/i/web/status/1305454521687191552 | mrkoot |
2020-09-14 10:30:03 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/3pgcR537eU https://www.secura.com/blog/zero-logon | Cyber_O51NT |
2020-09-14 10:20:04 | For the record, Zerologon (aka CVE-2020-1472) has been patched in the August 2020 Patch Tuesday It's described as… https://t.co/PjeCdhZfkJ https://twitter.com/i/web/status/1305449375506800640 | campuscodi |
2020-09-14 10:10:04 | Secura's CVE-2020-1472 whitepaper now available at https://t.co/cfUEzZdJfV (scroll down to download) https://www.secura.com/blog/zero-logon | djrevmoon |
2020-09-14 10:10:02 | Secura has published the whitepaper for the Zerologon vulnerability (CVE-2020-1472): https://t.co/RS0nlaXhQD https://www.secura.com/blog/zero-logon | _mohemiv |
2020-09-14 10:00:03 | Excited for the release of the whitepaper for the Zerologon, CVE-2020-1472 today. Interesting read at… https://t.co/z4NvaQrCg8 https://twitter.com/i/web/status/1305444279960117250 | 0xSV1 |
2020-09-14 09:40:03 | Test script for ZeroLogon (CVE-2020-1472) https://t.co/pVYtKwSh5X https://github.com/SecuraBV/CVE-2020-1472 | TelindusCSIRT |
2020-09-14 09:30:03 | CVE-2020-1472 : A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit It… https://t.co/IrxOl7LpKs https://twitter.com/i/web/status/1305436932902707201 | Anastasis_King |
2020-09-14 09:20:03 | GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/JZENDmdweq https://github.com/SecuraBV/CVE-2020-1472 | n0ipr0cs |
2020-09-14 09:00:04 | This is huge https://t.co/mqXUjYrUyJ, (CVE-2020-1472) https://www.secura.com/blog/zero-logon | mezdanak |
2020-09-14 07:30:06 | TheHackersNews: Here's a script to test the Netlogon elevation of privilege issue (CVE-2020-1472), a vulnerability… https://t.co/DOEInxhgk7 https://twitter.com/i/web/status/1305405979190845441 | B01Group |
2020-09-14 07:20:04 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) -> https://t.co/EN6xBG5Lfj https://www.secura.com/blog/zero-logon | FuzzySec |
2020-09-14 07:10:03 | @TheHackersNews : Here's a script to test the Netlogon elevation of privilege issue (CVE-2020-1472), a vulnerabilit… https://t.co/2cBkQfHXig https://twitter.com/i/web/status/1305401722383273984 | byHoRRoR |
2020-09-14 06:00:02 | Check if your Domain Controller is vulnerable to CVE-2020-1472 (CVSS:10): how an attacker essentially can become Do… https://t.co/RdtGukEK0Q https://twitter.com/i/web/status/1305385112205434880 | _odisseus |
2020-09-14 05:20:03 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/6DfLFzo7o8 https://www.secura.com/blog/zero-logon | nuria_imeq |
2020-09-14 00:20:03 | Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/I2NlOwsNn2 https://t.co/u81ikC9unx http://newsbythehour.org/cybr http://bit.ly/33n5f3z | everythingcybr |
2020-09-13 23:00:03 | Test tool for CVE-2020-1472 https://t.co/Sm6EwSn990 https://github.com/SecuraBV/CVE-2020-1472 | shodanpunk |
2020-09-13 19:00:03 | https://t.co/3VrJ0fw3dn Test tool for #CVE-2020-1472 (DC auth bypass) http://anonymous.bravehost.com/main/2020/09/13/119682/security/ | VitalAnon |
2020-09-13 18:50:07 | GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 - https://t.co/ss0fbQQ9p3 https://github.com/SecuraBV/CVE-2020-1472 | SoLatiK |
2020-09-13 18:30:08 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-13 18:10:05 | Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/diSKYhmGHF https://github.com/SecuraBV/CVE-2020-1472 | AlexaChenowith |
2020-09-13 17:20:03 | New post in https://t.co/1F9xRsdlML: CVE-2020-1472 https://t.co/k6hEx6G8Eg https://t.co/SBddaqFFWL http://canyoupwn.me https://bit.ly/2DX2zRB https://bit.ly/3bRgs08 | cypmsecnews |
2020-09-13 16:40:04 | Here's a script to test the Netlogon elevation of privilege issue (CVE-2020-1472), a vulnerability that can be expl… https://t.co/mKbrg4d4X0 https://twitter.com/i/web/status/1305184078958739456 | TheHackersNews |
2020-09-13 14:20:03 | Zerologon: instantly become domain admin by subverting Netlogon (CVE-2020-1472) https://t.co/ZlCzqd8ugR PoC https://t.co/6TRBdggRSS https://www.secura.com/blog/zero-logon https://github.com/SecuraBV/CVE-2020-1472 | cyber_advising |
2020-09-13 13:20:04 | Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/7lDi6zP4Do #appsec #security #secops https://ift.tt/3hsvoTq | rtcz_io |
2020-09-13 12:10:04 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/fA82H9tHvM https://twitter.com/i/web/status/1305114419916136451 | 0xdea |
2020-09-13 12:10:04 | A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit (CVE-2020-1472) Netl… https://t.co/I87sUzGsvW https://twitter.com/i/web/status/1305114247895056384 | prncpl1nf0s3c |
2020-09-13 12:00:03 | New post: "Test tool for CVE-2020-1472 (DC auth bypass)" https://t.co/kMnpI1NAeo https://ift.tt/33rOggi | Myinfosecfeed |
2020-09-13 11:20:03 | Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/wNlGNXcXFY http://hrbt.us/212194 | hardreboot |
2020-09-13 11:20:02 | Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/bQCCCbNb9T https://github.com/SecuraBV/CVE-2020-1472 | _r_netsec |
2020-09-13 10:30:03 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/vkBjMvATjL https://aeternusmalus.wordpress.com/2020/09/13/blog-zerologon-instantly-become-domain-admin-by-subverting-netlogon-cryptography-cve-2020-1472/ | DoggoJoshu |
2020-09-13 09:10:03 | CVE-2020-1472 - Test tool for CVE-2020-1472 https://t.co/I0w5HfJZTp http://github.com/SecuraBV/CVE-2020-1472 | pythontrending |
2020-09-13 08:40:03 | “[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)” https://t.co/8X4IpGJhg5 https://htn.to/3waaM6npFu | waiha8 |
2020-09-13 07:30:02 | Tweeting "CVE-2020-1472" just so I can be involved. | ii4xD |
2020-09-13 03:50:03 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/0B035B8Bh1 https://www.secura.com/blog/zero-logon | tais9 |
2020-09-12 20:50:03 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472): https://t.co/2frCt3XFyO https://www.secura.com/blog/zero-logon | tombolinux |
2020-09-12 20:40:02 | Added EVTX to repo for CVE-2020-1472 (ZeroLogon)❤️ https://t.co/q739kNlFA0 https://twitter.com/sbousseaden/status/1304867515844243458 | jessefmoore |
2020-09-12 18:30:06 | CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-09-12 16:30:03 | Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/tZ1Z8K0uC2 https://www.secura.com/blog/zero-logon | Inf0Junki3 |
2020-09-12 10:40:03 | POC for CVE-2020-1472 (CVSS:10) https://t.co/hjzUnYkHhc https://github.com/SecuraBV/CVE-2020-1472 | SaudiDFIR |
2020-09-12 10:40:03 | (CVE-2020-1472) This is an interesting vulnerability! | SaudiDFIR |
2020-09-12 08:10:02 | [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/uvotTYTJym https://www.secura.com/blog/zero-logon | raymondpoede |
2020-09-12 07:10:03 | #sigma rule for CVE-2020-1472 Netlogon MS-NRPC is out, free community access https://t.co/Dpykx7KWBU Detection work… https://t.co/kUvoNFSfZ6 https://tdm.socprime.com/tdm/info/FgNYLnTxIVrs/7GbXfnQBSh4W_EKGaxJx/?p=1 https://twitter.com/i/web/status/1304676530350628864 | andriinb |
2020-09-12 02:30:03 | Top story's from my Newspaper GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/RLs8tHzBiy,… https://t.co/qrHXMF1J3X https://github.com/SecuraBV/CVE-2020-1472 https://twitter.com/i/web/status/1304607819484848129 | infowaropcenter |
2020-09-12 02:30:03 | Top story: GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/RLs8tHzBiy, see more https://t.co/op6V5mLutF https://github.com/SecuraBV/CVE-2020-1472 http://tweetedtimes.com/v/16476?s=tnp | infowaropcenter |
2020-09-12 00:50:03 | 先月話題になった、WindowsのNetlogonのドメインコントローラ権限昇格の脆弱性(CVE-2020-1472)の検査用スクリプト。試せる環境は用意できてないですが、スクリプトの内容を見る限りFake PoCではなさそうです… https://t.co/BykRc0jRPl https://twitter.com/i/web/status/1304582409355108352 | gr4vit0n |
2020-09-12 00:50:02 | CyberSec News: GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/cqfDMFqPdQ, see more https://t.co/FQz6lRc2Mo https://github.com/SecuraBV/CVE-2020-1472 http://tweetedtimes.com/v/21183?s=tnp | Scott_London |
2020-09-12 00:40:03 | CVE-2020-1472測試工具 https://t.co/nTMunIe1jG https://www.secura.com/blog/zero-logon | Acardia2020 |
2020-09-11 23:30:03 | GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/as3KSKvNYe cc: @EurekaBerry https://github.com/SecuraBV/CVE-2020-1472 | 0x009AD6_810 |
2020-09-11 14:50:04 | GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 - https://t.co/CgjN3TOQKl https://github.com/SecuraBV/CVE-2020-1472 | piedpiper1616 |
2020-09-11 13:50:13 | A reminder to all organisations that they should ensure they patched CVE-2020-1472 (a Netlogon vulnerability from A… https://t.co/Blyo52khtU https://twitter.com/i/web/status/1304415569228300291 | GossiTheDog |
2020-09-11 13:20:04 | CVE-2020-1472 (CVSSv3=10) aka #Zerologon was fixed in Patch Tuesday Aug 2020: unauth-to-DA privesc via Netlogon in… https://t.co/3oifN6fk8z https://twitter.com/i/web/status/1304408361887301634 | mrkoot |
2020-09-11 13:00:03 | ❗We have just released a test tool for CVE-2020-1472 (CVSS:10) https://t.co/ziQOhJmC0Y The technical whitepaper ab… https://t.co/s9n2QFuWPa https://www.secura.com/blog/zero-logon https://twitter.com/i/web/status/1304404122674892800 | SecuraBV |
2020-09-11 12:30:02 | We just published a test tool for CVE-2020-1472 (CVSS:10) https://t.co/v18EnF7Xob and next Monday we will publish a… https://t.co/vxUw3UO8FI https://github.com/SecuraBV/CVE-2020-1472/ https://twitter.com/i/web/status/1304396680654204930 | djrevmoon |
2020-09-05 14:10:03 | なんか知らんけど、Secure Channelを暗号化しなくなったが、2021年2月9日以降CVE-2020-1472のセキュリティアップデートによって強制フェーズにより無効化(Secure Channelを強制的に有効)するから… https://t.co/L4I260hCiR https://twitter.com/i/web/status/1302247072570114049 | number3to4 |
2020-08-28 18:40:05 | CVE-2020-1472 https://t.co/BmC2HtUEmi #HarsiaInfo https://har-sia.info/CVE-2020-1472.html | Har_sia |
2020-08-28 01:40:02 | これって古いまま使っていると有効のままなの?どうだっけ? / “Yurika on Twitter: "8月の月例更新プログラムで出したAD環境のNetlogonの特権昇格の脆弱性CVE-2020-1472は、早期適用を強く強く推… https://t.co/QO9TyY2fwX https://twitter.com/i/web/status/1299159257439297536 | waiha8 |
2020-08-28 01:00:06 | 8月の月例更新プログラムで出したAD環境のNetlogonの特権昇格の脆弱性CVE-2020-1472は、早期適用を強く強く推奨です。認証なしユーザーがドメイン管理者へ特権昇格可能です。ゼロデイではありませんが未対応の方はぜひ早急… https://t.co/HEIVzfSA4W https://twitter.com/i/web/status/1299147725611520000 | EurekaBerry |
2020-08-28 00:10:02 | [AD 管理者] 8月の月例のセキュリティ更新にて、NetLogonの脆弱性(CVE-2020-1472)に対する、DC向けの重要なセキュリティ情報を公開しています。マイクロソフトから公開している情報にてお客様環境で必要な対応をご… https://t.co/RMURoqWeL3 https://twitter.com/i/web/status/1299137102332997634 | JSECTEAM |
2020-08-27 20:20:04 | CVE-2020-1472 | #Vulnérabilité d’élévation de privilèges dans #NetLogon / #Faille de #securite… https://t.co/LYyQ91ELD9 https://twitter.com/i/web/status/1299077846149857280 | PatriceLopez83 |
2020-08-27 16:00:03 | Microsoft’s August 2020 patch for CVE-2020-1472 - Netlogon Elevation of Privilege Vulnerability can cause business… https://t.co/Vgliu8oSUc https://twitter.com/i/web/status/1299013561096835073 | KrollWire |
2020-08-24 18:40:08 | New post from https://t.co/9KYxtdZjkl (CVE-2020-1472 (windows_server_2008, windows_server_2012, windows_server_2016… https://t.co/JwOb8ytChF http://www.sesin.at https://twitter.com/i/web/status/1297965738095935491 | www_sesin_at |
2020-08-24 18:40:07 | New post from https://t.co/uXvPWJy6tj (CVE-2020-1472 (windows_server_2008, windows_server_2012, windows_server_2016… https://t.co/8T5alLA2ey http://www.sesin.at https://twitter.com/i/web/status/1297965804525432833 | WolfgangSesin |
2020-08-22 06:50:03 | CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability. „This security update addresses the vulnerability by… https://t.co/wSapTwp6OP https://twitter.com/i/web/status/1297062986167791617 | Deyda84 |
2020-08-21 13:10:05 | [Blog] CVE-2020-1472 : Vulnérabilité Microsoft NetLogon https://t.co/8kjS1gP9Ge #securite https://www.julienmousqueton.fr/cve-2020-1472-vulnerabilite-microsoft-netlogon/?utm_source=twitter&utm_medium=social&utm_campaign=zapier | JMousqueton |
2020-08-21 07:20:24 | Can't wait for the blog post. People vastly underestimated CVE-2020-1472... for now. https://t.co/3F3e6KfVBG https://twitter.com/SecuraBV/status/1295325366224138240 | newsoft |
2020-08-18 16:36:12 | CVE-2020-1472 | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon s… https://t.co/H5dQOYdoLD https://twitter.com/i/web/status/1295458838016131072 | ZeroSecVulns |
2020-08-18 16:35:33 | CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon sec… https://t.co/j1G4vKVJ3f https://twitter.com/i/web/status/1295461729221193728 | CVEnew |
2020-08-18 13:00:06 | New post from https://t.co/uXvPWJy6tj (CVE-2020-1472) has been published on https://t.co/DbhrdwXdT7 http://www.sesin.at https://www.sesin.at/2020/08/18/cve-2020-1472/ | WolfgangSesin |
2020-08-18 13:00:03 | New post from https://t.co/9KYxtdZjkl (CVE-2020-1472) has been published on https://t.co/zmDEXKtw6x http://www.sesin.at https://www.sesin.at/2020/08/18/cve-2020-1472/ | www_sesin_at |
2020-08-17 22:20:07 | CVE-2020-1472 is called Wattled Lathe https://t.co/VuWWpkGXeE https://nvd.nist.gov/vuln/detail/CVE-2020-1472 | vulnonym |
2020-08-17 13:20:04 | @RyanLNewington A few clarifications regarding some speculation about CVE-2020-1472: https://t.co/bZeaiXtOPv https://twitter.com/SecuraBV/status/1295325366224138240 | djrevmoon |
2020-08-17 13:10:08 | @hackthebox_eu CVE-2020-1472 because it doesn't have a cool name and a logo | olivier_boschko |
2020-08-17 09:50:03 | Security vulnerability update CVE-2020-1472 released by Microsoft on August 11, 2020 in order to secure the AD infr… https://t.co/1JsPm8wZov https://twitter.com/i/web/status/1295294886195818497 | nocagile |
2020-08-15 15:26:48 | @d4rckh Namaste, here is your unroll: @RyanLNewington: Here's a digest of my understanding of #CVE-2020-1472 for th… https://t.co/M6HVMkKog4 https://twitter.com/i/web/status/1293635701939085315 | threadreaderapp |
2020-08-14 19:20:11 | Microsoft Security Advisory - Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) https://t.co/I2NlOwsNn2 https://t.co/VgBMBvRY1o http://newsbythehour.org/cybr http://bit.ly/3gKzvuC | everythingcybr |
2020-08-14 13:00:03 | Ermanno Goletto CVE-2020-1472 – Netlogon Elevation of Privilege Vulnerability https://t.co/EqB9uhKeQz https://t.co/brBtXhiSqP https://www.devadmin.it/2020/08/14/cve-2020-1472-netlogon-elevation-of-privilege-vulnerability/ http://ifttt.com/images/no_image_card.png | ictpower_it |
2020-08-14 12:20:03 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/55BHAGaEsD https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | rodtrent |
2020-08-13 23:50:05 | Tracked as 'CVE-2020-1472,' the vulnerability can be exploited by unauthenticated attackers to use Netlogon Remote… https://t.co/s45kIDI9Y8 https://twitter.com/i/web/status/1294056974712102912 | Null0x00Bytes |
2020-08-13 16:40:03 | The full fix for CVE-2020-1472, assuming your DC has the August update: [Net.ServicePointManager]::SecurityProtoco… https://t.co/ln8F3Fb6co https://twitter.com/i/web/status/1293948542294331393 | rhymeswithmogul |
2020-08-13 13:00:16 | Time to Patch! It is time to patch a critical-risk vulnerability (CVE-2020-1472) in your Domain Controller, a vulne… https://t.co/jOoepWsDzE https://twitter.com/i/web/status/1293894703776174081 | Improsec |
2020-08-13 12:30:37 | @mikas_khb Михаил, диаграммы показывают среду, в которой все Windows Server КД защищены от CVE-2020-1472. Для этого… https://t.co/2DYI1fWmb8 https://twitter.com/i/web/status/1293885571195195394 | ArtyomSinitsyn |
2020-08-13 09:00:06 | CVE-2020-1472: NetLogon Privilege Escalation Vulnerability Alert: On August 11, 2020, Windows officially released a… https://t.co/Q0Vzaqws6B https://twitter.com/i/web/status/1293832940955213824 | morodog |
2020-08-13 07:20:03 | @ArtyomSinitsyn CVE-2020-1472 на слайде нет варианта: "патченный DC на винде" и "непатченный DC на винде", что буде… https://t.co/9XECqFbCoR https://twitter.com/i/web/status/1293808829893881856 | mikas_khb |
2020-08-13 01:30:03 | The full fix for CVE-2020-1472, assuming your DC is updated: [Net.ServicePointManager]::SecurityProtocol=[Net.Secu… https://t.co/7O2w6s9XJ1 https://twitter.com/i/web/status/1293720766710775817 | rhymeswithmogul |
2020-08-12 22:00:04 | CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability https://t.co/MerU2GAfzX https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472 | K3RN3L__P4N1C |
2020-08-12 21:40:04 | Huge Domain Controller zero day exploit (CVE-2020-1472), patch DC's as fast as possible and keep an close eye for E… https://t.co/rFNkLQAp4M https://twitter.com/i/web/status/1293663009710190594 | Rene_Dissel |
2020-08-12 20:10:05 | New post in https://t.co/1F9xRsdlML: CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability… https://t.co/X6FmZP1Hpk http://canyoupwn.me https://twitter.com/i/web/status/1293640142369042432 | cypmsecnews |
2020-08-12 19:50:18 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/JjC15ViCIs https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | DavidHardcore69 |
2020-08-12 16:20:07 | @msftsecresponse do we have to deploy CVE-2020-1472 to fully-patched-through-July Windows 10/Server (2012/2016/2019… https://t.co/7BpMTg5QWl https://twitter.com/i/web/status/1293581956307914752 | jrh7675 |
2020-08-12 14:00:10 | A parchar sus controladores de dominio, señores: CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability… https://t.co/g4TI11X4bk https://twitter.com/i/web/status/1293545514747731975 | dagamone |
2020-08-12 12:20:08 | @ArtyomSinitsyn CVE-2020-1472 на схеме нет варианта патченный ДЦ на винде и непатченный ДЦ на винде, что будет если… https://t.co/vN8D9baFQs https://twitter.com/i/web/status/1293521155882733570 | mikas_khb |
2020-08-12 09:50:19 | Microsoft Security Advisory - Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) https://t.co/K7Ik6OVtfa… https://t.co/wkjEdMxWeQ https://ift.tt/3ix6C5z https://twitter.com/i/web/status/1293482695100637185 | rtcz_io |
2020-08-12 09:00:15 | #News CVE-2020-1472: NetLogon Privilege Escalation Vulnerability Alert: On August 11, 2020, Windows officially rele… https://t.co/Qw6p8w37jp https://twitter.com/i/web/status/1293470052964999168 | morodog |
2020-08-12 08:50:06 | Ny sårbarhed i MS-NRPC (CVE-2020-1472) . Følg anbefalingerne til brug af Secure RPC. Patchen vil skrive til dine… https://t.co/3taPCpBC2x https://twitter.com/i/web/status/1293469305573642240 | CFCSsitcen |
2020-08-12 08:41:06 | Hey blue team buddies. Has anyone got any suggestions on how to monitor for CVE-2020-1472 ? | nemesis09 |
2020-08-12 07:10:06 | Here's a digest of my understanding of #CVE-2020-1472 for the Microsoft Netlogon secure channel vulnerability and w… https://t.co/FRcU1O3Q7Q https://twitter.com/i/web/status/1293444103208722432 | RyanLNewington |
2020-08-12 07:01:22 | Microsoft Security Advisory – Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) https://t.co/A2xBbJ0mPA http://hrbt.us/209374 | hardreboot |
2020-08-12 07:00:54 | New post: "Microsoft Security Advisory - Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472)" https://t.co/iTfIraYAZk https://ift.tt/3gKzve6 | Myinfosecfeed |
2020-08-12 07:00:30 | CVE-2020-1472, unauthenticated RCE on DC via vuln in Netlogon RPC. Network access seems to be the only requirement… https://t.co/EmlcvefrKj https://twitter.com/i/web/status/1293440980989902849 | cfalta |
2020-08-12 06:30:18 | New post: CVE-2020-1472:NetLogon特权提升漏洞通告 https://t.co/U4KrIHH3UQ:netlogon特权提升漏洞通告/ https://reportcybercrime.com/cve-2020-1472 | digitpol_cyber |
2020-08-12 06:30:07 | Microsoft Security Advisory - Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) https://t.co/IkKbYKHyyc https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472 | _r_netsec |
2020-08-12 06:20:22 | Esta claro que 2020 lo estamos jugando en dificultad "venga ya": https://t.co/jDnjdkaocW CVE-2020-1472 - NetLogon… https://t.co/JTdB6YHXfR https://www.thezdi.com/blog/2020/8/11/the-august-2020-security-update-review https://twitter.com/i/web/status/1293429607190978560 | antoniosanzalc |
2020-08-12 04:50:04 | Windows Server received a partial fix for CVE-2020-1472, which could allow an unauthenticated attacker to gain admi… https://t.co/VlkIA0M3N4 https://twitter.com/i/web/status/1293407752753156096 | aburassen2 |
2020-08-12 04:30:05 | CVE-2020-1472: NetLogon Privilege Escalation Vulnerability Alert https://t.co/tQxEVVsm22 #info #news #tech https://meterpreter.org/cve-2020-1472-netlogon-privilege-escalation-vulnerability-alert/ | the_yellow_fall |
2020-08-12 04:10:03 | New post: CVE-2020-1472: NetLogon特权提升漏洞通告 – 360CERT https://t.co/Npihp34YQR特权提升漏洞通告-360cert/ https://reportcybercrime.com/cve-2020-1472-netlogon | digitpol_cyber |
2020-08-12 03:40:02 | CVE-2020-1472 Netlogon EoP vulnerability Upon successful exploitation, the *unauthenticated* attacker could gain do… https://t.co/pv29T0ocEg https://twitter.com/i/web/status/1293391725394685958 | maxxxie74 |
2020-08-12 02:30:03 | 影響が大きそうなセキュリティ更新プログラム(CVE-2020-1472)がリリースされそうですね。。。 https://t.co/QaOyImOJiZ https://twitter.com/JSECTEAM/status/1293323569661906947 | deepyear |
2020-08-12 02:20:03 | CVE-2020-1472 https://t.co/lj2itGugxT https://lnkd.in/gUW2WtE | yamami_117 |
2020-08-12 02:00:03 | Has anyone who has deployed the patch for CVE-2020-1472 found devices that are reported as using insecure ms-nrpc? | RyanLNewington |
2020-08-12 01:30:02 | CVE-2020-1472 なにこれ | Sergeant_sw |
2020-08-12 00:00:08 | CVE-2020-1472 (NetLogon)はCVSS10.0 DCにパッチ適用でドメイン内のWindows端末はSecureRPCのsecure channelに切り替わり対応OK。ドメイン内の非Windowsの端末はSec… https://t.co/Ti1nPbJRuD https://twitter.com/i/web/status/1293334048924790784 | EurekaBerry |
2020-08-11 22:20:05 | Hhmmm... CVE-2020-1472🤤 Élévation de privilèges sans authentification via le protocole RPC sur les contrôleurs de… https://t.co/J7VcbV9V8d https://twitter.com/i/web/status/1293309460363063297 | jdidi3r |
2020-08-11 20:50:27 | A Microsoft MVP's work is never done. Now started to address Netlogon vulnerability CVE-2020-1472 #MVPBuzz #patchtuesday | WorkingHardInIT |
2020-08-11 20:50:25 | @girlgerms to cheer you up - already started to address Netlogon vulnerability CVE-2020-1472 | WorkingHardInIT |
2020-08-11 20:50:02 | I am disapointed CVE-2020-1472 does not have a cool name and a logo. Something like BlueRPCBleed | el_d33 |
2020-08-11 19:10:12 | CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability https://t.co/MPEHCYdkdT https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1472 | 0xdea |
2020-08-11 18:40:06 | Do I read MS' bulletin for CVE-2020-1472 correctly ? "To exploit the vulnerability, an unauthenticated attacker w… https://t.co/vEJZikOTY2 https://twitter.com/i/web/status/1293255214557007878 | _trou_ |
2020-08-11 18:20:03 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 #infosec… https://t.co/GCsdQmf4Lf https://twitter.com/i/web/status/1293250828720119808 | rootsecdev |
2020-08-11 18:10:03 | How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/7FqkHI4OY5 https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc | gN3mes1s |
2020-08-06 22:50:19 | CVE-2020-1472 master 1 branch 0 tags Go to file ... https://t.co/2GZi59Hte3 http://vulmon.com/vulnerabilitydetails?qid=CVE-2020-1472 | VulmonFeeds |