CVE STALKER

CVE-2020-1472

CVSS5
DESCRIPTIONAn elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.
HEAT SCORE13600

WORDS

TWEETS

DATE TWEETS USER
2023-05-06 06:10:23🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2020-1472: https://t.co/BxcU5estlK 👉 CVE-2023-27326… https://t.co/ra6IEbWqI0 https://github.com/G0urmetD/Zerologon-CVE-2020-1472 https://twitter.com/i/web/status/1654730001617502209Prohacktiv3
2023-05-01 17:02:50🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2020-1472: https://t.co/uxCPnRXJXn https://t.co/3nTBmm7pJo https://github.com/Akash7350/CVE-2020-1472Prohacktiv3
2023-04-23 18:12:07Zero Logon - I have just completed this room! Check it out: https://t.co/Ep2Po4lTUP #tryhackme #CVE-2020-1472… https://t.co/8iALxbaKaZ https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1650198228464173059AgntLgn
2023-04-06 13:35:41@ipv6labs NetAppのKB、まともに読めない問題 CVE-2020-1472なんでしょうけどKBにCVE-2018-1472って書いてあるし...それにしてもCIFSで使ってるとたいへんそうですね...g_plains
2023-04-01 15:40:33Zero Logon - I have just completed this room! Check it out: https://t.co/kUGHN5KGeN #tryhackme #CVE-2020-1472… https://t.co/TUVBHqjNyo https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1642189775007301634Christe05505504
2023-03-12 14:30:16Zero Logon - I have just completed this room! Check it out: https://t.co/1KzeKypI7b #tryhackme #CVE-2020-1472… https://t.co/NiiTppD5IU https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1634923920485912578MParis84
2023-03-11 10:31:45Zero Logon - I have just completed this room! Check it out: https://t.co/fMjU6x0YBW #tryhackme #CVE-2020-1472… https://t.co/q39V6oYOM0 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1634500732782034946ArmeriaVillosa
2023-02-20 07:37:56🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2020-1472: https://t.co/kCAxJKSDni 👉 CVE-2022-0492:… https://t.co/PQaof0jLho https://github.com/RicYaben/CVE-2020-1472-LAB https://twitter.com/i/web/status/1627564125713797122Prohacktiv3
2023-02-15 21:38:30The list of Active Directory scanners/attacks implemented for now: - SMB signing - ZeroLogon (CVE-2020-1472) by Se… https://t.co/7kgYV95Bu3 https://twitter.com/i/web/status/1625969342998347788MizaruIT
2023-02-14 00:19:50New post from https://t.co/uXvPWJy6tj ([AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要) has been published on https://t.co/gJjKt926Qu http://www.sesin.at https://www.sesin.at/2023/02/14/ad-%e7%ae%a1%e7%90%86%e8%80%85%e5%90%91%e3%81%91-cve-2020-1472-netlogon-%e3%81%ae%e5%af%be%e5%bf%9c%e3%82%ac%e3%82%a4%e3%83%80%e3%83%b3%e3%82%b9%e3%81%ae%e6%a6%82%e8%a6%81/WolfgangSesin
2023-02-14 00:18:46New post from https://t.co/9KYxtdZjkl ([AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要) has been published on https://t.co/ySYQu8lct6 http://www.sesin.at https://www.sesin.at/2023/02/14/ad-%e7%ae%a1%e7%90%86%e8%80%85%e5%90%91%e3%81%91-cve-2020-1472-netlogon-%e3%81%ae%e5%af%be%e5%bf%9c%e3%82%ac%e3%82%a4%e3%83%80%e3%83%b3%e3%82%b9%e3%81%ae%e6%a6%82%e8%a6%81/www_sesin_at
2023-02-10 16:16:21「当該組織によるフォレンジック調査の結果、AD の Zerologon(CVE-2020-1472)と呼ばれる脆弱性が悪用された痕跡が確認されたとのことである。」 🥲0x009AD6_810
2023-01-20 18:21:279️⃣ ZeroLogon (CVE-2020-1472) Allows an attacker to gain unauthorized access to a domain controller by sending a… https://t.co/tyHQ9jlbgz https://twitter.com/i/web/status/1616499752572715008SentinelOne
2023-01-05 21:12:32New post (Zerologon (CVE-2020-1472): Critical Active Directory Vulnerability) has been published on… https://t.co/AnhM62uWGg https://twitter.com/i/web/status/1611106764841271296zamarax
2022-12-28 22:20:07Zero Logon - I have just completed this room! Check it out: https://t.co/8ziFTamGGZ #tryhackme #CVE-2020-1472… https://t.co/dicLIGbHky https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1608225176801394689lerchmirko
2022-12-21 17:26:43Zero Logon - I have just completed this room! Check it out: https://t.co/WkglHilhzR #tryhackme #CVE-2020-1472… https://t.co/fwAMgEoiAs https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1605581345094189056Praison01
2022-12-21 16:59:24Zero Logon - I have just completed this room! Check it out: https://t.co/WkglHilhzR #tryhackme #CVE-2020-1472… https://t.co/fwAMgEoiAs https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1605581345094189056Praison01
2022-12-16 00:51:29Zero Logon - I have just completed this room! Check it out: https://t.co/f3IL99pHlL #tryhackme #CVE-2020-1472… https://t.co/hjVFpQHwlp https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1603535234296791041Jasonlee2504
2022-12-07 01:50:57引用:Windowsの認証プロトコルである「Netlogon」に存在する脆弱性(CVE-2020-1472、「Zerologon」と呼ばれている)を悪用して、ドメイン管理者権限を取得する手口 https://t.co/HREaV6w6VK https://japan.zdnet.com/article/35196986/skycancer
2022-11-29 16:41:09CVE-2020-1472域内提权漏洞利用 https://t.co/yGrupTQgwU https://t.co/peQv4eI0xr https://ift.tt/412zlNV https://ift.tt/tKXgzsPbuaqbot
2022-11-19 17:21:47zerologon CVE-2020-1472 aka Zerologon Exploit POC NetLogon (MS-NRPC), can establish inter-domain control vulnerab… https://t.co/SrrAHH1FSn https://twitter.com/i/web/status/1594015224012869637hack_git
2022-11-17 15:40:38Zero Logon - I have just completed this room! Check it out: https://t.co/6WAHf7lm1s #tryhackme #CVE-2020-1472… https://t.co/kOdmhVzIwe https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1593267039279681536nullshock1
2022-11-08 22:22:28Zero Logon - I have just completed this room! Check it out: https://t.co/EhyTgIlweP #tryhackme #CVE-2020-1472… https://t.co/Ka4mBSLvak https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1590103198643417088clars2k
2022-11-04 06:40:49Emerging Vulnerability Found CVE-2020-1472 - An elevation of privilege vulnerability exists when an attacker establ… https://t.co/FaCuSz6J80 https://twitter.com/i/web/status/1588418503832469504ColorTokensInc
2022-11-04 00:03:13「偵察段階を超えて、Black Basta はさまざまなエクスプロイトを通じて、ローカルおよびドメイン レベルの権限昇格を試みます。ZeroLogon (CVE-2020-1472)、NoPac (CVE-2021-42287、C… https://t.co/eOfAFc3akC https://twitter.com/i/web/status/1588319008428032000NobMiwa
2022-11-03 22:57:09Zero Logon - I have just completed this room! Check it out: https://t.co/caKiauAh3a #tryhackme #CVE-2020-1472… https://t.co/b5O5KXigyx https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1588297625174183936SquareByte_Tech
2022-10-28 21:43:41Zerologon — Netlogon Elevation of Privilege Vulnerability — CVE-2020-1472 https://t.co/E1MtGECb1r #cybersecurity #cve20201472 #cve http://dlvr.it/SbtLXsiSecurity
2022-10-08 23:50:11Zero Logon - I have just completed this room! Check it out: https://t.co/UNUc1BXxjX #tryhackme #CVE-2020-1472… https://t.co/ypKOSotq3O https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1578894618514444288Sirlike20
2022-10-07 05:54:34Zero Logon - I have just completed this room! Check it out: https://t.co/hcZaJcG8b9 #tryhackme #CVE-2020-1472… https://t.co/KcqX8PDGs7 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1578258972317982721IngyaJoshua
2022-09-30 16:55:41Zero Logon - I have just completed this room! Check it out: https://t.co/ePXMUoqHp4 #tryhackme #CVE-2020-1472… https://t.co/f9FvEC0CLj https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1575887583199887365charmassie
2022-09-30 09:44:13Tool for mass scanning ZeroLogon vulnerability CVE-2020-1472 https://t.co/oHq83wQ8a2 https://github.com/guglia001/MassZeroLogonMarioGuglia
2022-09-30 07:23:18用于大规模测试 ZeroLogon 漏洞 CVE-2020-1472 的工具 https://t.co/VGjdyovQQY https://t.co/Ud9MefyzWE https://ift.tt/WtRyF9K https://ift.tt/Fi34rsLbuaqbot
2022-09-22 03:01:14Zero Logon - I have just completed this room! Check it out: https://t.co/tC1ZjeMyQR #tryhackme #CVE-2020-1472… https://t.co/ElNSEZ4e2y https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1572782634903674881andretorresbr
2022-09-12 00:01:24Zero Logon - I have just completed this room! Check it out: https://t.co/R4ADvhfeNO #tryhackme #CVE-2020-1472… https://t.co/zVcQav9zcV https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1569111531643703297ITPR_Guy
2022-09-05 11:41:13Zero Logon - I have just completed this room! Check it out: https://t.co/hVD2onuupC #tryhackme #CVE-2020-1472… https://t.co/enUlgnwhI2 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1566751911461675008dzolti
2022-09-01 23:00:21Zero Logon - I have just completed this room! Check it out: https://t.co/x0BMKqUphe #tryhackme #CVE-2020-1472… https://t.co/69srnBaFqp https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1565472899762475009Mach1982
2022-08-29 12:55:08Hacking Active Directory - Zerologon (CVE-2020-1472) Today I will demonstrate how to hack active directory using Z… https://t.co/JNrLpSFdut https://twitter.com/i/web/status/1564231746375372806xogutu
2022-08-29 05:11:07🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2022-27255: https://t.co/mCYNlSAI79 👉 CVE-2020-1472… https://t.co/pvzSTzSiss https://github.com/stryker-project/CVE-2022-27255-checker https://twitter.com/i/web/status/1564117370653876227Prohacktiv3
2022-08-28 20:55:40Zero Logon - I have just completed this room! Check it out: https://t.co/bqdhatG7tg #tryhackme #CVE-2020-1472… https://t.co/hROm05hKDR https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1563969670377603073wittyAle123
2022-08-23 20:30:51A different way of abusing Zerologon (CVE-2020-1472) https://t.co/Bf6FspCuG4 https://t.co/TC75M6OpBw https://ift.tt/TySd9DJ https://ift.tt/giE5Iqlbuaqbot
2022-07-01 23:10:22Zero Logon - I have just completed this room! Check it out: https://t.co/ZaIGABwJzA #tryhackme #CVE-2020-1472… https://t.co/nmmhefb2RO https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1543008829046153219B_key01
2022-06-24 06:32:22🚨 Surveillance des #POC (Proof Of Concept) sur @github : 👉 CVE-2020-1472: https://t.co/w789rLjs0W https://github.com/lele8/CVE-2020-1472Prohacktiv3
2022-06-22 09:56:38CVE-2020-1472 https://t.co/cT7etM2nHQ https://t.co/IMhGWeQpuZ https://ift.tt/aKj5swq https://ift.tt/zgkcemtbuaqbot
2022-06-15 23:04:05Zero Logon - I have just completed this room! Check it out: https://t.co/j60gme1G7T #tryhackme #CVE-2020-1472… https://t.co/0aa5VjU9OD https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1537206950244630528AzikeCT
2022-06-11 20:40:34Zero Logon - I have just completed this room! Check it out: https://t.co/A8RkFvJKcc #tryhackme #CVE-2020-1472… https://t.co/6FaJLtdI3v https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1535722781601562626scovled123
2022-06-10 09:00:06Zero Logon - I have just completed this room! Check it out: https://t.co/qDlCCmdCmT #tryhackme #CVE-2020-1472… https://t.co/esoR7kjoBR https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1535184356934918144ruhellio
2022-06-02 02:13:22Zero Logon - I have just completed this room! Check it out: https://t.co/ZTgJAjnMKM #tryhackme #CVE-2020-1472… https://t.co/SMFlHfXQVT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1532181397170962432crypto_cache
2022-05-18 08:35:58Zero Logon - I have just completed this room! Check it out: https://t.co/gWGSJ6PPAt #tryhackme #CVE-2020-1472… https://t.co/AJAGv4brAg https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1526738594144067585Oxmar00
2022-05-18 08:20:44Zero Logon - I have just completed this room! Check it out: https://t.co/gWGSJ6PPAt #tryhackme #CVE-2020-1472… https://t.co/AJAGv4brAg https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1526738594144067585Oxmar00
2022-05-18 07:51:52Zero Logon - I have just completed this room! Check it out: https://t.co/gWGSJ6PPAt #tryhackme #CVE-2020-1472… https://t.co/AJAGv4brAg https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1526738594144067585Oxmar00
2022-05-18 07:37:50Zero Logon - I have just completed this room! Check it out: https://t.co/gWGSJ6PPAt #tryhackme #CVE-2020-1472… https://t.co/AJAGv4brAg https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1526738594144067585Oxmar00
2022-04-28 00:35:31Zero Logon - I have just completed this room! Check it out: https://t.co/KyP0GiGOco #tryhackme #CVE-2020-1472… https://t.co/jLmn1qJk7D https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1518658625039908865infosec_Brady
2022-04-27 23:43:04Zero Logon - I have just completed this room! Check it out: https://t.co/KyP0GiGOco #tryhackme #CVE-2020-1472… https://t.co/jLmn1qJk7D https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1518658625039908865infosec_Brady
2022-04-27 21:36:30Zero Logon - I have just completed this room! Check it out: https://t.co/KyP0GiGOco #tryhackme #CVE-2020-1472… https://t.co/jLmn1qJk7D https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1518658625039908865infosec_Brady
2022-04-27 09:41:26New post from https://t.co/uXvPWJy6tj (CVE-2020-1472 (debian_linux, directory_server, fedora, leap, samba, ubuntu_l… https://t.co/t0X16cnqex http://www.sesin.at https://twitter.com/i/web/status/1519249212998930433WolfgangSesin
2022-04-27 09:41:17New post from https://t.co/9KYxtdZjkl (CVE-2020-1472 (debian_linux, directory_server, fedora, leap, samba, ubuntu_l… https://t.co/NJTC0srOjs http://www.sesin.at https://twitter.com/i/web/status/1519249214454259718www_sesin_at
2022-04-26 19:12:53Samba - CVE-2020-1472: https://t.co/bGRrUVUie0 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472LinInfoSec
2022-04-26 18:46:08Severity: 🔥🔥🔥 | An elevation of privilege vulnerability ... | CVE-2020-1472 | Link for more: https://t.co/YtzxwcxaFa http://alerts.remotelyrmm.com/CVE-2020-1472RemotelyAlerts
2022-04-26 17:33:56🚨 NEW: CVE-2020-1472 🚨 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Net… https://t.co/Ut5abksN2L https://twitter.com/i/web/status/1519001673871601664threatintelctr
2022-04-24 18:09:28Zero Logon - I have just completed this room! Check it out: https://t.co/yCSgi1ovhs #tryhackme #CVE-2020-1472… https://t.co/Pz0TpsBpLq https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1518058211693182976chadtubbs05
2022-04-14 12:03:51Zero Logon - I have just completed this room! Check it out: https://t.co/kfIEOteVw3 #tryhackme #CVE-2020-1472… https://t.co/iXT2NddEPB https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1514572530916511751henriquirus
2022-03-28 17:31:43Zero Logon - I have just completed this room! Check it out: https://t.co/6PO5tUGxXx #tryhackme #CVE-2020-1472… https://t.co/LOv7oZB02v https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1508494464888844300t32kmebt_
2022-03-28 04:30:53Zero Logon - I have just completed this room! Check it out: https://t.co/iDqjvtuKMw #tryhackme #CVE-2020-1472… https://t.co/wKfpSPIzSw https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1508299919198760964SmeadWebDev
2022-03-24 21:12:34Zero Logon - I have just completed this room! Check it out: https://t.co/0ejTkLFvzE #tryhackme #CVE-2020-1472… https://t.co/qgnPMrrfIp https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1507100842738044940JeromeSeychell
2022-03-23 22:00:52Zero Logon - I have just completed this room! Check it out: https://t.co/tY4ydmfIDe #tryhackme #CVE-2020-1472… https://t.co/C2o14PZK8x https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1506750498094960651Abouozil97
2022-03-07 00:10:05Zero Logon - I have just completed this room! Check it out: https://t.co/ewv2J4NhFx #tryhackme #CVE-2020-1472… https://t.co/gu2ydQ2Eif https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1500623981606490114dolIaraday
2022-02-22 23:40:07Today several new Zerologon (CVE-2020-1472) signatures were released. These rules have been tagged with a "signific… https://t.co/2EiVkedHLG https://twitter.com/i/web/status/1496268159325818884ET_Labs
2022-02-22 16:30:44Managed to play around with the 'Zero Logon' exploit (#CVE-2020-1472) over on @realtryhackme! It is both amazing an… https://t.co/zDFu2wrrIf https://twitter.com/i/web/status/1496158404292882437AshcorpDev
2022-02-21 20:19:47Nice analysis by @TheDFIRReport shows how #Qbot and exploitation of the #Zerologon vulnerability (#CVE-2020-1472) l… https://t.co/0hwpv6iXQJ https://twitter.com/i/web/status/1495748216905732097v4ensics
2022-02-21 19:59:58Nice analysis by @TheDFIRReport shows how #Qbot and exploitation of the #Zerologon vulnerability (#CVE-2020-1472) l… https://t.co/0hwpv6iXQJ https://twitter.com/i/web/status/1495748216905732097v4ensics
2022-02-21 19:38:42Nice analysis by @TheDFIRReport shows how #Qbot and exploitation of the #Zerologon vulnerability (#CVE-2020-1472) l… https://t.co/0hwpv6iXQJ https://twitter.com/i/web/status/1495748216905732097v4ensics
2022-02-21 19:20:59Nice analysis by @TheDFIRReport shows how #Qbot and exploitation of the #Zerologon vulnerability (#CVE-2020-1472) l… https://t.co/0hwpv6iXQJ https://twitter.com/i/web/status/1495748216905732097v4ensics
2022-02-17 14:21:25New report out Monday 2/21! You'll see mentions of Qbot, Zerologon (CVE-2020-1472), AdFind, overpass-the-hash, Co… https://t.co/QGoh6qaKFG https://twitter.com/i/web/status/1494314440912736260TheDFIRReport
2022-02-16 12:30:05Zero Logon - I have just completed this room! Check it out: https://t.co/0e2x9JOSp2 #tryhackme #CVE-2020-1472… https://t.co/UUyNAZIZ7R https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1493923670951346181ksdshu11
2022-02-12 04:20:44Zero Logon - I have just completed this room! Check it out: https://t.co/0Im7BLyaXk #tryhackme #CVE-2020-1472… https://t.co/H2fsNsKXhb https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1492351734399778817genji_x___
2022-02-10 12:11:59Zero Logon - I have just completed this room! Check it out: https://t.co/tFwZmpHw7Q #tryhackme #CVE-2020-1472… https://t.co/AoRdovKWkX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1491728174442590208stringuetta
2022-02-10 11:43:46Zero Logon - I have just completed this room! Check it out: https://t.co/tFwZmpHw7Q #tryhackme #CVE-2020-1472… https://t.co/AoRdovKWkX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1491728174442590208stringuetta
2022-02-01 21:50:32Zero Logon - I have just completed this room! Check it out: https://t.co/KdeNtJdX7z #tryhackme #CVE-2020-1472… https://t.co/IS8gLCEg7g https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1488629022267523075x_RiKi_
2022-01-31 21:40:45Zero Logon - I have just completed this room! Check it out: https://t.co/PHN3L0x9ai #tryhackme #CVE-2020-1472… https://t.co/KbTL0fa3h5 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1488265261497077765Mirakenic
2022-01-30 17:00:36CVE-2020-1472的分析与复现 https://t.co/jv7BSFdr5s https://t.co/hsSPYK8Ftq https://ift.tt/NjcDmKEqM https://ift.tt/ZFHj42bysbuaqbot
2022-01-28 22:19:29Zero Logon - I have just completed this room! Check it out: https://t.co/pps2pUsI1y #tryhackme #CVE-2020-1472… https://t.co/yJ39iUEvi7 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1487164108986372100Cyb3r5toic
2022-01-26 21:50:14Zero Logon - I have just completed this room! Check it out: https://t.co/q6Gyjw6VzJ #tryhackme #CVE-2020-1472… https://t.co/MMmTLI40Dk https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1486456347881140224rumagejamie
2022-01-22 01:40:23Zero Logon - I have just completed this room! Check it out: https://t.co/C14dAZ6WVk #tryhackme #CVE-2020-1472… https://t.co/p90ZPdVBlx https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1484670725403328512seriousm_bbh
2022-01-22 01:26:30Zero Logon - I have just completed this room! Check it out: https://t.co/C14dAZ6WVk #tryhackme #CVE-2020-1472… https://t.co/p90ZPdVBlx https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1484670725403328512seriousm_bbh
2022-01-22 01:14:14Zero Logon - I have just completed this room! Check it out: https://t.co/C14dAZ6WVk #tryhackme #CVE-2020-1472… https://t.co/p90ZPdVBlx https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1484670725403328512seriousm_bbh
2022-01-21 00:20:40Zero Logon - I have just completed this room! Check it out: https://t.co/O408eUdTWH #tryhackme #CVE-2020-1472… https://t.co/tmndkJnXe9 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1484317738747457536hunterdevil0001
2022-01-13 23:39:26Zero Logon - I have just completed this room! Check it out: https://t.co/l2GbLPVZzI #tryhackme #CVE-2020-1472… https://t.co/71U6UkFm1c https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1481760033193013251bogganj94
2022-01-13 15:31:44Rubrik CDM - CVE-2020-9478 Zerologon - CVE-2020-1472 DLINK Devices - CVE-2019-17510 Linux Out of Bounds - CVE-2019-… https://t.co/c40Nw5ZtXD https://twitter.com/i/web/status/1481647750723031040Har_sia
2022-01-07 17:40:26Zero Logon - I have just completed this room! Check it out: https://t.co/H5p3OLgP98 #tryhackme #CVE-2020-1472… https://t.co/rD7Rfe9pS3 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1479506604378755080polymathiann
2022-01-02 07:50:08Zero Logon - I have just completed this room! Check it out: https://t.co/sqskkmmomH #tryhackme #CVE-2020-1472… https://t.co/jTdJ8EV39U https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1477547076779220995DoolztheDaring
2022-01-01 22:34:02Zero Logon - I have just completed this room! Check it out: https://t.co/IibiZP16Gj #tryhackme #CVE-2020-1472… https://t.co/7q8bmb07it https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1477401457280303110of3ll
2022-01-01 18:22:46Zero Logon - I have just completed this room! Check it out: https://t.co/LvkY1aO7oA #tryhackme #CVE-2020-1472… https://t.co/S9TT62tigP https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1477288523187302405zhiliao_shi
2022-01-01 18:03:08Zero Logon - I have just completed this room! Check it out: https://t.co/LvkY1aO7oA #tryhackme #CVE-2020-1472… https://t.co/S9TT62tigP https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1477288523187302405zhiliao_shi
2021-12-23 14:11:56#Обучение ZeroLogon в Windows Server. Эксплуатация CVE-2020-1472... https://t.co/npdrYKtgBL https://t.co/WPJmWKOxAj https://t.me/s/it_news_for_all/37605IT_news_for_all
2021-12-23 13:03:34Zero Logon - I have just completed this room! Check it out: https://t.co/fzqq7pSOhx #tryhackme #CVE-2020-1472… https://t.co/96nlBPmxh7 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1473997921326673923tekgurl_kayla
2021-12-22 07:17:07CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon se… https://t.co/j26cYqenjz https://twitter.com/i/web/status/1473549702616567810VulmonFeeds
2021-12-18 22:32:57Zero Logon - I have just completed this room! Check it out: https://t.co/WySI650LVQ #tryhackme #CVE-2020-1472… https://t.co/o2KK39Lz4D https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1472324798504214528CaladanJC
2021-12-15 22:52:40Zerologon(CVE-2020-1472)のときも、今回のApache Log4j(CVE-2021-44228)でも #TryHackMe にて動作検証。 実際に手を動かすことで如何に刺さりやすい脆弱性であるのか実体験とし… https://t.co/5x4MR1C63i https://twitter.com/i/web/status/1471249621444096001v_avenger
2021-12-15 22:51:47Zerologon(CVE-2020-1472)に関する #TryHackMe のルームはこちら。 https://t.co/mhqAMA4xcP https://tryhackme.com/room/zer0logonv_avenger
2021-12-15 18:48:03Zero Logon - I have just completed this room! Check it out: https://t.co/SOSmj9kXF8 #tryhackme #CVE-2020-1472… https://t.co/RNGLQBcscK https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1471186134751449089swehtpantz
2021-12-06 06:20:04Zero Logon - I have just completed this room! Check it out: https://t.co/6WYy4eVPdI #tryhackme #CVE-2020-1472… https://t.co/dOl6ELKyQo https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1467739262615388165grumpzsux
2021-12-01 14:12:40Live hacking demo of CVE-2020-1472 & CVE-2021-26084: ✔️ Industry expert best practices from Brad LaPorte: ✔️Learn h… https://t.co/8J7F49jcOd https://twitter.com/i/web/status/1466044464871481347nopsec
2021-11-10 05:13:58Hoja de referencia de detección de exploits CVE-2020-1472 (#Zerologon) https://t.co/i52CrCQhsA https://www-kroll-com.translate.goog/en/insights/publications/cyber/cve-2020-1472-zerologon-exploit-detection-cheat-sheet?_x_tr_sl=en&_x_tr_tl=es&_x_tr_hl=en-GB&_x_tr_pto=nuiov3rflow1
2021-11-01 12:20:13#rootsector ➡️Zerologon (CVE-2020-1472) exploited 2 hours after initial execution of Bazar ➡️Cobalt Strike & Bazar… https://t.co/Wj5fex35J3 https://twitter.com/i/web/status/1455146356176261132Rootsector
2021-10-29 13:50:19Exactly one year ago, @CISAgov warned us about the continued #exploitation of CVE-2020-1472. Today, our #ArcticEWS… https://t.co/lZlIGJtzH7 https://twitter.com/i/web/status/1454081838729863179ArcticSecurity
2021-10-22 19:16:37Zero Logon - I have just completed this room! Check it out: https://t.co/gEqYhWEh9X #tryhackme #CVE-2020-1472… https://t.co/g3QeuJIVxX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1451621108759867394kost_by
2021-10-20 16:00:09One way to detect exploitation of CVE-2020-1472 is through Windows Security Event 4742 and Windows System Event 580… https://t.co/JdiytMrQhe https://twitter.com/i/web/status/1450853257677574155jkhalouian
2021-10-20 13:10:17ZeroLogon (CVE-2020-1472) exploit used by a threat group utilizing Hancitor for initial access. ➡️Report out in a… https://t.co/YPESf9H1Va https://twitter.com/i/web/status/1450809036153131014TheDFIRReport
2021-10-14 17:30:08Zero Logon - I have just completed this room! Check it out: https://t.co/mK2pg4p0ZL #tryhackme #CVE-2020-1472… https://t.co/OGsNr0G9Wm https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1448700292284010502martinbayard
2021-10-13 21:30:05Zero Logon - I have just completed this room! Check it out: https://t.co/Bwye9RRdxz #tryhackme #CVE-2020-1472… https://t.co/o88aaxd5Yr https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1448399857400619015basti0220
2021-10-13 21:30:03Zero Logon - I have just completed this room! Check it out: https://t.co/spf7MDxiTS #tryhackme #CVE-2020-1472… https://t.co/9y0sE5gICX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1448400433672765441ihoruhe
2021-10-11 15:50:10Zero Logon - I have just completed this room! Check it out: https://t.co/D7prYtbYFC #tryhackme #CVE-2020-1472… https://t.co/wSai9IEnNV https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1447589540990947330LCsTed
2021-09-30 00:20:33Zero Logon - I have just completed this room! Check it out: https://t.co/2Mh1B2VZYs #tryhackme #CVE-2020-1472… https://t.co/mkwr3nmBf4 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1443367519725789192illustrioushefe
2021-09-26 13:50:42Zero Logon - I have just completed this room! Check it out: https://t.co/qyw5wayWho #tryhackme #CVE-2020-1472… https://t.co/McR7OtHTH9 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1442124225146355713meneeither
2021-09-23 13:00:11Zero Logon - I have just completed this room! Check it out: https://t.co/rVejC4dK6o #tryhackme #CVE-2020-1472… https://t.co/dhynYg2fzW https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1441023157343772675hakkiaucar
2021-09-22 06:20:10Zero Logon - I have just completed this room! Check it out: https://t.co/9QAspNv0kz #tryhackme #CVE-2020-1472… https://t.co/yh8Kaw2RjB https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1440559568396767235mimilove_exe
2021-09-22 03:50:37Zero Logon - I have just completed this room! Check it out: https://t.co/x4M0HNWLyx #tryhackme #CVE-2020-1472… https://t.co/dZjDjNGlbv https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1440521405435551744IlmanRI
2021-09-22 02:31:19Just did an exploit for #zerologin CVE-2020-1472 and a pass-the-hash attack on a W2016 DC using Impacket. Song: Th… https://t.co/zTxviZfs1M https://twitter.com/i/web/status/1440501321442861061infinityABCDE
2021-09-16 18:01:57Zero Logon - I have just completed this room! Check it out: https://t.co/WYuHOJqr97 #tryhackme #CVE-2020-1472… https://t.co/JzsbGqrxU8 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1438561767517560837MikeyBendz
2021-09-15 02:40:09Zero Logon - I have just completed this room! Check it out: https://t.co/GaOP10pggp #tryhackme #CVE-2020-1472… https://t.co/mhs1Chd2QJ https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1437968961790959619packetwitcher
2021-09-14 19:52:13Zero Logon - I have just completed this room! Check it out: https://t.co/8fmbePf4Pt #tryhackme #CVE-2020-1472… https://t.co/E6tlfiujvX https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1437865935709380608InfoSecPhoenix
2021-09-09 13:21:22Zero Logon - I have just completed this room! Check it out: https://t.co/yZ68jzh7Sn #tryhackme #CVE-2020-1472… https://t.co/QgTpjvp6FB https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1435955490543054849nvemb3r
2021-08-31 15:30:10Zero Logon - I have just completed this room! Check it out: https://t.co/JFdkwgcRwm #tryhackme #CVE-2020-1472… https://t.co/CNxuyLcE8V https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1432726386150494211trblgc
2021-08-31 14:30:08“Em um ano de vulnerabilidades e incidentes que se tornaram manchetes, o Zerologon (CVE-2020-1472) se destaca por s… https://t.co/pxasApB3oL https://twitter.com/i/web/status/1432710021297627137dansantanna
2021-08-30 13:20:06Our Security Response Team highlighted #Zerologon (CVE-2020-1472) as one of the Top 5 Vulnerabilities of 2020.… https://t.co/zMoMl6A4jA https://twitter.com/i/web/status/1432331420626788352TenableSecurity
2021-08-30 12:50:06In a year of headline-making vulnerabilities and incidents, Zerologon (CVE-2020-1472) stands out due to its widespr… https://t.co/JfGyo4a12k https://twitter.com/i/web/status/1432322719157129219Lexicon21
2021-08-27 13:02:44Zero Logon - I have just completed this room! Check it out: https://t.co/9WuCILfLXG #tryhackme #CVE-2020-1472… https://t.co/6Jtqg4UqHM https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1431237980568625161Cyb3rky
2021-08-27 05:00:11Zero Logon - I have just completed this room! Check it out: https://t.co/S3XVa5m1rR #tryhackme #CVE-2020-1472… https://t.co/3Xl6IqFqTN https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1431118572328263683must4maa
2021-08-26 20:20:18“Em um ano de vulnerabilidades e incidentes que se tornaram manchetes, o Zerologon (CVE-2020-1472) se destaca por s… https://t.co/7TDqMCvR26 https://twitter.com/i/web/status/1430987631886626816Art_Capella
2021-08-22 02:50:05Zero Logon - I have just completed this room! Check it out: https://t.co/KBXcjFE5j8 #tryhackme #CVE-2020-1472… https://t.co/BDxSFalOHb https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1429272339045179463s3CuritYmatt3rs
2021-08-19 19:10:19@UK_Daniel_Card Slight typo, the vendor for CVE-2020-1472 should be Microsoft. Netlogon is the CVE name.douglasmun
2021-08-19 17:10:15“If you have yet to install CVE-2020-1472 on your Windows servers, do so immediately... it will protect you from th… https://t.co/A4z9bQSPZN https://twitter.com/i/web/status/1428401456164519939FirstResponseEu
2021-08-19 13:20:05Zero Logon - I have just completed this room! Check it out: https://t.co/vvRgRLFONw #tryhackme #CVE-2020-1472… https://t.co/L7eABBmCtz https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1428344347221708806MarcusChachuls1
2021-08-18 09:30:05In a year of headline-making vulnerabilities and incidents, Zerologon (CVE-2020-1472) stands out due to its widespr… https://t.co/Mt7Dx5dKTD https://twitter.com/i/web/status/1427925442263076864AlicePintori
2021-08-13 10:50:05In a year of headline-making vulnerabilities and incidents, Zerologon (CVE-2020-1472) stands out due to its widespr… https://t.co/51LpFxZem1 https://twitter.com/i/web/status/1426131514798985220Art_Capella
2021-08-10 10:50:22VoidSec/CVE-2020-1472: Exploit Code for CVE-2020-1472 aka Zerologon #Infosec via https://t.co/KDUhFaFE1M https://t.co/qVVImkA6Bc http://twinybots.ch https://github.com/VoidSec/CVE-2020-1472cornichecorp
2021-08-09 11:40:25CVE-2020-1472: Exploit Code for CVE-2020-1472 aka Zerologon #infosec #pentest #redteam https://t.co/oSkeRCqStR https://t.co/Ndofel4LoM https://github.com/VoidSec/CVE-2020-1472CyberWarship
2021-08-07 17:20:03On a recent pentest job for a client, i found a DC still vulnerable to Zerologon (CVE-2020-1472), it took around 15… https://t.co/xxhIjPNHts https://twitter.com/i/web/status/1424057245403426818zertux6
2021-08-07 03:00:11@SwiftOnSecurity Are you talking about CVE-2020-1472? Because it really sounds like you're talking about how MS us… https://t.co/naDhueUVvF https://twitter.com/i/web/status/1423839028613369858shugenja
2021-08-06 15:20:05Эксплуатация CVE-2020-1472 Zerologon в Cobalt Strike.txt which explains how to use Beacon Object Files (designed to… https://t.co/26NJUuBdqf https://twitter.com/i/web/status/1423664395956232196KyleHanslovan
2021-08-06 04:00:05Instructions for using CVE-2020-1472 Zerologon exploit through Cobalt Strike https://t.co/vqITVM7Uz7AuCyble
2021-08-04 16:30:19Zero Logon - I have just completed this room! Check it out: https://t.co/zrexKIqcO3 #tryhackme #CVE-2020-1472… https://t.co/ORn4sBTozU https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1422957679249481729Kaushik02052914
2021-07-29 11:50:19CVE-2020-1472はVendor名がMSではなくNetlogonになってますね😅 Alert (AA21-209A) Top Routinely Exploited Vulnerabilities… https://t.co/ttIbKaAS5E https://twitter.com/i/web/status/1420711837411147777autumn_good_35
2021-07-29 10:20:06Windows Server用戶小心!PetitPotam漏洞恐讓攻擊者挾持AD網域 https://t.co/E2Xp0mUIeQ 針對網域控制器(DC)的弱點,一年前有Zerologon(CVE-2020-1472),一旦攻擊… https://t.co/Quoj6qcj7V https://www.ithome.com.tw/news/145919 https://twitter.com/i/web/status/1420689579795910661M157q_News_RSS
2021-07-28 17:40:50CVE-2020-1472 ZeroLogon testing script A Python script that uses the Impacket library to test vulnerability for th… https://t.co/tADr1hvY8a https://twitter.com/i/web/status/1420436905297072140CyberWarship
2021-07-26 21:40:40Zero Logon - I have just completed this room! Check it out: https://t.co/BFw7t6f9ta #tryhackme #CVE-2020-1472… https://t.co/4C7h8ekOsv https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1419770621224005643cnrd
2021-07-25 17:00:07Zero Logon - I have just completed this room! Check it out: https://t.co/Te13S6qQGN #tryhackme #CVE-2020-1472… https://t.co/JXLDxGPulR https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1419339233123262467FoxtrotBugcrowd
2021-07-21 13:50:45CVE-2020-1472 'Requires the latest impacket from GitHub with added netlogon structures.' #infosec #pentest… https://t.co/wIXj5NiPBI https://twitter.com/i/web/status/1417841806184783875CyberWarship
2021-07-20 06:20:13Zero Logon - I have just completed this room! Check it out: https://t.co/os8C5j4Fc5 #tryhackme #CVE-2020-1472… https://t.co/mNqPJvk9PV https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1417366293410426891Cultiv8Resilync
2021-07-17 14:10:066 CVEs Popular with Criminals: -CVE-2020-1472 (aka ZeroLogon) -CVE-2020-0796 (aka SMBGhost) -CVE-2019-19781 -CVE-2… https://t.co/6BQfeymr64 https://twitter.com/i/web/status/1416397813202624517z3r0trust
2021-07-12 09:50:05Zero Logon - I have just completed this room! Check it out: https://t.co/2j55pYo9Z7 #tryhackme #CVE-2020-1472… https://t.co/CKe8hvIM5c https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1414520069183397895luizfernandorg
2021-07-11 00:00:11Zero Logon - I have just completed this room! Check it out: https://t.co/7AezSCPbsP #tryhackme #CVE-2020-1472… https://t.co/3H7NCTVcJc https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1414010617271361536hildemarope
2021-07-10 19:00:31Zero Logon - I have just completed this room! Check it out: https://t.co/gHEx9loYpM #tryhackme #CVE-2020-1472… https://t.co/d1aUOHVtXq https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1413935050098450435sudoneuron
2021-07-09 12:31:32Zero Logon - I have just completed this room! Check it out: https://t.co/mhGr0VpT7H #tryhackme #CVE-2020-1472… https://t.co/gbOWyTNOK8 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1413474976548544516devil8731
2021-07-05 01:10:04Zero Logon - I have just completed this room! Check it out: https://t.co/clBR4eLZtC #tryhackme #CVE-2020-1472… https://t.co/SfeNgvwSGH https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1411853583046303747WsgSec
2021-07-02 08:41:06There are 2911 deployments of Sonicwall SMA 200 firmware & 688 products with CVE-2020-1472 that are currently in us… https://t.co/RTf9uALxMn https://twitter.com/i/web/status/1410878550811594752CswWorks
2021-06-29 04:20:05Zero Logon - I have just completed this room! Check it out: https://t.co/mcbihj0sCu #tryhackme #CVE-2020-1472… https://t.co/d1xDXiTv5r https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1409726322977427460xfavatax
2021-06-24 03:20:04Zero Logon - I have just completed this room! Check it out: https://t.co/7HZZjHbmHF #tryhackme #CVE-2020-1472… https://t.co/11kJmeqiSO https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/14078992876069437441NinjaRyder1
2021-06-22 22:30:13Zero Logon - I have just completed this room! Check it out: https://t.co/gjoDvEVEis #tryhackme #CVE-2020-1472… https://t.co/YoWCHbH7Sl https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1407465093407809540_glitchXR
2021-06-17 12:59:14Zero Logon - I have just completed this room! Check it out: https://t.co/shHKatq85N #tryhackme #CVE-2020-1472… https://t.co/GjA4H30vth https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1405502893982203909DanDreadless
2021-06-12 17:30:19Zero Logon - I have just completed this room! Check it out: https://t.co/piOMbPDJVj #tryhackme #CVE-2020-1472… https://t.co/fqOEKYrAxh https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1403764805673099274i_know_u_are
2021-06-09 10:00:19Zero Logon - I have just completed this room! Check it out: https://t.co/AUWLqtqhpi #tryhackme #CVE-2020-1472… https://t.co/E7Lu1PQZze https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1402565983462645760EduardoEllery
2021-06-02 21:50:03Zero Logon - I have just completed this room! Check it out: https://t.co/xnSfOenq59 #tryhackme #CVE-2020-1472… https://t.co/WJ7UpXb9Q7 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1400207640182022146DazBrownfield
2021-05-27 00:39:26Zero Logon - I have just completed this room! Check it out: https://t.co/Z6apEpTN2T #tryhackme #CVE-2020-1472… https://t.co/qSZ72BhqgK https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1397654191091367941prjct_pi
2021-05-21 03:00:12Zero Logon - I have just completed this room! Check it out: https://t.co/s66IUYiX7h #tryhackme #CVE-2020-1472… https://t.co/gqDe6zwyMD https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1395572967732568065elbee_ez
2021-05-15 03:30:02i wish i can go back to the days where CVE-2020-1472 was trending on my feed and not this traumatic madness... https://t.co/Bdzdt1SozUTebbaaX
2021-05-12 22:00:02Zero Logon - I have just completed this room! Check it out: https://t.co/C31S1BGvtd #tryhackme #CVE-2020-1472… https://t.co/T8hk8mZ4US https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1392599857957937158D3faultS3tting
2021-05-12 17:50:07Zero Logon - I have just completed this room! Check it out: https://t.co/C8zNn2D2S4 #tryhackme #CVE-2020-1472… https://t.co/MNkmdgtwxj https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1392536063885946880djeffnews
2021-05-12 13:50:02@FireEye @Mandiant The screenshot shows CVE-2021-1472, but the report shows CVE-2020-1472 (zerologon). Is CVE-202… https://t.co/BSYMF4N1Va https://twitter.com/i/web/status/1392477137064583169bobbyinfosec
2021-05-06 08:30:03Netlogon (Zerologon) Vulnerability (CVE-2020-1472): Improper implementation of AES-CFB8. Find out more on our artic… https://t.co/2SoVtpovst https://twitter.com/i/web/status/1390220888642105346SophiaCyber
2021-05-02 19:00:13Zero Logon - I have just completed this room! Check it out: https://t.co/w9fBdfFr2q #tryhackme #CVE-2020-1472… https://t.co/q2GcYAQwLT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1388911992832995335PinguinRotten
2021-05-02 08:00:04Zero Logon - I have just completed this room! Check it out: https://t.co/QvsXliXTPp #tryhackme #CVE-2020-1472… https://t.co/aW00VAgeYl https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1388764440972173313d3tm4r
2021-05-01 23:10:07Zero Logon - I have just completed this room! Check it out: https://t.co/8ziFTamGGZ #tryhackme #CVE-2020-1472… https://t.co/LNcGRqTS76 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1388615789129961475lerchmirko
2021-04-21 21:42:16Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472) - https://t.co/vntJqX2Ebu https://www.tenable.com/blog/oracle-april-2021-critical-patch-update-addresses-257-cves-including-zerologon-cve-2020-1472ka0com
2021-04-18 20:00:04Day 34 of #100DaysOfHacking Worked on; ▶️Security+ videos @ProfessorMesser Completed; ✅CVE-2020-1472 Zerologon @RangeForcedwambia
2021-04-15 11:00:04CVE-2020-1472 in https://t.co/Z30KKC8KhK dotnet/AspNetCore #31831 https://t.co/cE7MUpom5Z http://mcr.microsoft.com/dotnet/core/aspnet:3.1-buster-slim https://github.com/dotnet/aspnetcore/issues/31831aspnetissues
2021-04-10 13:40:04Packet sniffing, A brief overview on Zerologon exploit ( CVE-2020-1472 ), threat detection.... Learnt good stuff.… https://t.co/SlZu82lRm7 https://twitter.com/i/web/status/1380877360849854466Blankeyezero
2021-04-09 02:10:03Day 11 of #100DaysOfHacking ✅Core Windows Processes @RealTryHackMe ✅CVE-2020-1472 Zerologon @RangeForce ▶️Sec+… https://t.co/2bde5n3YuB https://twitter.com/i/web/status/1380340611899928577DKHInfosec
2021-04-05 21:20:09Zero Logon - I have just completed this room! Check it out: https://t.co/3YKkDI2p6f #tryhackme #CVE-2020-1472… https://t.co/qSLnMu3vzu https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1379179696634617856DKHInfosec
2021-04-01 00:20:04CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker es... https://t.co/2GZi59pRPt Cust… https://t.co/2QjWL3yrfe http://vulmon.com/vulnerabilitydetails?qid=CVE-2020-1472 https://twitter.com/i/web/status/1377414322448523269VulmonFeeds
2021-03-26 20:00:05Alerta sobre a vulnerabilidade CVE-2020-1472 no protocolo #Netlogon, apelidado de #Zerologon. https://t.co/JaHAQ2jShK https://bit.ly/3d9foFNEChavarro
2021-03-25 01:00:032020 年 8 月 に修正パッチがリリースされた後もエクスプロイトが続いているCVE-2020-1472(ZeroLogon 脆弱性)。 BlackBerry インシデント対応(IR)チームが発見したランサムウェアのデプロイに… https://t.co/orRxGtQDGQ https://twitter.com/i/web/status/1374888765240451075BlackBerryJPsec
2021-03-22 19:10:04@mubix CVE-2020-1472 not a bad post-exploitation type examplejohnjhacking
2021-03-16 07:00:02Last update needed for Zerologon, finally available » CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to En… https://t.co/FxfkjqrnJW https://twitter.com/i/web/status/1371716706142457856reverseame
2021-03-05 16:40:10Zero Logon - I have just completed this room! Check it out: https://t.co/LxTOCnTPow #tryhackme #CVE-2020-1472… https://t.co/yeXFfmdqsY https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1367877036468039680JarrodR87
2021-03-02 19:01:16Zero Logon - I have just completed this room! Check it out: https://t.co/ukok1lRWhK #tryhackme #CVE-2020-1472… https://t.co/Rn034m3cLy https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1366823351751237636n0rdvallt
2021-03-01 20:10:26Suite au patch CVE-2020-1472 de Microsoft le mount cifs linux ne fonctionne plus au niveau de l'authentification. Q… https://t.co/wEDKMmpfsU https://twitter.com/i/web/status/1366480516103491586spiwit
2021-02-28 13:40:11whoops ~ I just published #Zerologon CVE-2020-1472?? Easy Way To Take Over Active Directory (Exploitation) https://t.co/h3F32AuaP3 https://link.medium.com/IxVpuIdSeebevanald__
2021-02-25 18:48:33Zero Logon - I have just completed this room! Check it out: https://t.co/xFw2SrJvRY #tryhackme #CVE-2020-1472… https://t.co/M0FFL50o03 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1364651782945800193huey_4
2021-02-25 17:11:31Zero Logon - I have just completed this room! Check it out: https://t.co/xFw2SrJvRY #tryhackme #CVE-2020-1472… https://t.co/M0FFL50o03 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1364651782945800193huey_4
2021-02-25 01:01:13CVE-2020-1472 aka Zerologon Is very effective on domain controllers, using the Netlogon Remote Protocol (MS-NRPC),… https://t.co/jDG4M8FH9G https://twitter.com/i/web/status/13647401637635440641337in
2021-02-24 17:01:09Netlogon secure channel, CVE-2020-1472 … problemas https://t.co/Kpo8ZsOQvo http://www.mundosysadmin.com/netlogon-secure-channel-cve-2020-1472-problemas/b0fh3r_666
2021-02-21 18:30:09@virtualmanc This would have been caused by the Feb updates patching CVE-2020-1472 https://t.co/U8FBuYujdB https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472dips_nk
2021-02-19 14:50:09A security firm named Secura has published a white paper of a vulnerability (CVE-2020-1472) affecting Microsoft's… https://t.co/9YvjAHLDRh https://twitter.com/i/web/status/1362775783136231427secforeveryone
2021-02-19 01:10:08Spiffy Zerologon (CVE-2020-1472): SentinelOne First to Detect on the Endpoint https://t.co/iijT5GGRtk via @YouTube https://youtu.be/SqqZSDTNgTwWayne_Bridgeman
2021-02-16 21:40:03refresh.. CVEs: 45 includes: sudo CVE-2021-3156 smb/netlogon CVE-2020-1472awatkins1966
2021-02-15 20:50:20Shared: Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) | CI… https://t.co/Tpd6AhbwQ0 https://twitter.com/i/web/status/1361415235781816325WinObs
2021-02-14 15:00:05CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/pYqBiiGwnx http://ow.ly/x8Ce102zaDoAlicePintori
2021-02-14 11:00:03How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/Fm67Ax0nMI https://support.microsoft.com/en-us/topic/how-to-manage-the-changes-in-netlogon-secure-channel-connections-associated-with-cve-2020-1472-f7e8cc17-0309-1d6a-304e-5ba73cd1a11epeterwestra
2021-02-12 18:30:55CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2021-02-12 13:00:14今月はシステム管理者にとって胃が痛い月になるかな。 2月Microsoft月例パッチをADサーバに当てるとCVE-2020-1472の対策が強制されて、事前に緩和対策してない古い非準拠デバイスがAD認証できなくなる。 去年の8月か… https://t.co/gsQOPUqZFg https://twitter.com/i/web/status/1360210546155347968AmagaeruPurple
2021-02-12 13:00:05CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default #CyberRisk… https://t.co/e1FtGC0Y09 https://twitter.com/i/web/status/13602118086618685441Ivango1
2021-02-11 18:30:06CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2021-02-11 17:00:03Happy Chinese New Year! Just found out that the final patch for CVE-2020-1472 was released this week, this mitiga… https://t.co/I2DyaivTGc https://twitter.com/i/web/status/1359909356981092361edwardzpeng
2021-02-11 14:20:06Microsoft addressed a critical remote code execution vulnerability affecting the Netlogon protocol (CVE-2020-1472)… https://t.co/mmD4R292A5 https://twitter.com/i/web/status/1359868196866715655papervote
2021-02-11 14:10:05Hello Twitter, des avis sur le deuxième correctif CVE-2020-1472 #ZeroLogon ? Il est urgent ou pas du coup ? J'avoue être dubitatif ...BaptisteD4V1D
2021-02-11 12:50:07Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) #Anonymous https://t.co/1olrmpbPWt https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472AnonAnonymous
2021-02-11 09:40:03Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472):… https://t.co/y39govOYB7 https://twitter.com/i/web/status/1359798440012709888KeoXes
2021-02-11 07:20:03Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) addresed, so beginning February… https://t.co/4D6ELHz0re https://twitter.com/i/web/status/1359761885034393600EloySalamancaR
2021-02-11 07:10:05Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/EBVcOpm3Ea https://twitter.com/i/web/status/1359759332641026048cyberdian_cert
2021-02-11 05:30:04Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/fEF2H2VNrg https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-codemeknowhu
2021-02-11 04:30:03Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/bpA8QoHPvQ https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-codeRRalstonAgile
2021-02-11 00:50:57Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) - https://t.co/txwowBbG3O https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-codemoton
2021-02-11 00:11:52【ニュース】zerologonに対処する最終段階のパッチがリリース ・非セキュアなRPC通信ができなくなる「強制モード」が有効に ・CVEは「CVE-2020-1472」 ・システム担当者は非セキュア通信をしている端末がないか要… https://t.co/8POmoEBENk https://twitter.com/i/web/status/1359653908423929856BlogLoki
2021-02-10 22:30:07Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/Ki6OxD3yWw https://twitter.com/i/web/status/1359630729571934217SecureNetIT
2021-02-10 22:12:41#Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/bdFZdYVqDs https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-codeSec_Cyber
2021-02-10 21:52:15Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) Original rel… https://t.co/F0tluSjHiQ https://twitter.com/i/web/status/1359618632549081093InfoSecHotSpot
2021-02-10 21:42:55US-CERT - Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/4ZSdln9phH https://ift.tt/3rCW21Bbuzz_sec
2021-02-10 21:40:16Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/fPslSI8Bbp https://content.govdelivery.com/bulletins/gd/USDHSCISA-2c092e3/MiniTuxedo
2021-02-10 21:22:24Microsoft addressed a critical remote code execution vulnerability affecting the Netlogon protocol (CVE-2020-1472)… https://t.co/yzCZ4m0LY7 https://twitter.com/i/web/status/1359610643448532995drwareinc
2021-02-10 21:12:08Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/myTkcACJyO https://www.itsecuritynews.info/microsoft-launches-phase-2-mitigation-for-netlogon-remote-code-execution-vulnerability-cve-2020-1472/IT_securitynews
2021-02-10 21:12:02Microsoft’s #PatchTuesday update included Phase 2 mitigation of CVE-2020-1472, enabling Domain Controller enforceme… https://t.co/A3veSL8XUO https://twitter.com/i/web/status/1359609418669842433USCERT_gov
2021-02-10 21:10:34Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/sNSAwyhWnu https://www.drware.com/microsoft-launches-phase-2-mitigation-for-netlogon-remote-code-execution-vulnerability-cve-2020-1472/drwareinc
2021-02-10 21:01:14Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/aYYlCSH3Ga https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-codegregoryfarley
2021-02-10 20:52:08#Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/TlmplQ2oZC https://bit.ly/374Cj34blu3cloak
2021-02-10 20:41:44Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/PDQWgcbcHw https://sl.advdat.com/3qaYRXdADVDAT_OH
2021-02-10 20:41:30CERT Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/KOHYTB64FF https://bit.ly/371KQDXPAUL_CSFI
2021-02-10 20:41:17BOLO: Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/IErVxuSqp9 https://twitter.com/i/web/status/1359601267425898505Inceptus3
2021-02-10 20:41:12Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/0VWXSeiyWN https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-codesecurity_inside
2021-02-10 20:31:43Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/lnJADv5zX3 https://twitter.com/i/web/status/1359599024542650370AcooEdi
2021-02-10 20:31:17Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/w7pokegJwj https://us-cert.cisa.gov/ncas/current-activity/2021/02/10/microsoft-launches-phase-2-mitigation-netlogon-remote-code?utm_source=dlvr.it&utm_medium=twittercorq
2021-02-10 20:30:21Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472)… https://t.co/X7L8CELSQE https://twitter.com/i/web/status/1359599896203059208ATTOGTech
2021-02-10 20:30:07#infosec Microsoft Launches Phase 2 Mitigation for Netlogon Remote Code Execution Vulnerability (CVE-2020-1472) https://t.co/4T2Alq4Mi9 https://ift.tt/2Z1im8Kjeffreydbrown
2021-02-10 18:41:52CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2021-02-10 18:30:06Reminder: February is the enforcement patch installation of #zerologon CVE-2020-1472 #BlueTeam #PatchTuesday #infosec #CyberSecurityWeisterCreek
2021-02-10 16:34:18CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/JejZfRJ52f http://ow.ly/SQKe102yNY6Patent_4405829
2021-02-10 12:20:55CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/Ej7WfQ8pTR http://ow.ly/sbj2102yLW7Art_Capella
2021-02-10 08:20:28CVE-2020-1472 #Compliance Baseline with #MEMCM $EventId = 5827,5828,5829,5830,5831 $log = Get-WinEvent -FilterHash… https://t.co/vDrVxYnGsa https://twitter.com/i/web/status/1359416086526050305GENICTCOM
2021-02-10 06:40:05CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/HYf1KEFXak https://www.tenable.com/blog/cve-2020-1472-microsoft-finalizes-patch-for-zerologon-to-enable-enforcement-mode-by-defaultopexxx
2021-02-10 03:00:07承前) ・CVE-2020-1472 (Netlogon) は、予定通り、今月公開したセキュリティ更新プログラムを適用することで強制モードが有効に。ka0com
2021-02-10 03:00:04CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default https://t.co/Z0IGAro64O https://www.tenable.com/blog/cve-2020-1472-microsoft-finalizes-patch-for-zerologon-to-enable-enforcement-mode-by-defaultka0com
2021-02-10 01:01:41最後に今月はZerlogon (CVE-2020-1472 -)への対処として安全なNetlogonを強制が実施。2月のパッチをDCに適用すると準拠しないNetlogon接続は拒否するようになる。 https://t.co/lAC9Jt3ScB https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/EurekaBerry
2021-02-10 01:01:33なお、ADへの脆弱性対処強制はあと2つ予定されている。2月に強制予定だった CVE-2020-16996 は3月に延期。あとひとつ CVE-2020-1472 への対処強制が5月に予定されています。AD管理者の方はあらためてご確認をEurekaBerry
2021-02-09 19:41:34Netlogon is placed in enforcement mode all devices w/today's new patch for CVE-2020-1472. Resources:… https://t.co/ZwCLPP2Y7N https://twitter.com/i/web/status/1359223209573441537GossiTheDog
2021-02-09 10:50:03Zero Logon - I have just completed this room! Check it out: https://t.co/bwLcJJitQP #tryhackme #CVE-2020-1472… https://t.co/0isuT7O4PZ https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1359092024495009792edoardottt2
2021-02-08 22:10:39Zero Logon - I have just completed this room! Check it out: https://t.co/94rLO7bv2n #tryhackme #CVE-2020-1472… https://t.co/PEqyU7vXZE https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1358887510257127425m0hamm3dx00
2021-02-07 20:00:04Zero Logon - I have just completed this room! Check it out: https://t.co/i2FoE44LRG #tryhackme #CVE-2020-1472… https://t.co/h1z5oJsxUk https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1358505428259340289Muldwych
2021-02-05 23:30:10CVE-2020-1472(Zerologon): Poco queda por decir de esta vulnerabilidad, que parecía que iba a ser la última gran not… https://t.co/mmIavQvlmY https://twitter.com/i/web/status/1357833286643499011grevelo1
2021-02-04 23:52:48#Microsoft has warned us that that on Feb. 9th patches will enforce CVE-2020-1472 #Windows7 PCs to have an issue co… https://t.co/1ZvcRXQEWe https://twitter.com/i/web/status/1357472189402914825TheFulcrumGroup
2021-02-01 15:00:04Get Zerlologons CVE-2020-1472 using #PowerShell: https://t.co/gRPr0vDCO2 #vulnerability #microsoft http://directoryadmin.blogspot.com/2020/12/get-zerlologons-cve-2020-1472-using.htmldirectoryadmin
2021-01-28 00:00:37Microsoft addressed a Critical RCE vulnerability affecting the Netlogon protocol (CVE-2020-1472) on August 11, 2020… https://t.co/l05aRlIY02 https://twitter.com/i/web/status/1354578333439287296NSGHELP
2021-01-27 09:40:52Zero Logon - I have just completed this room! Check it out: https://t.co/Ow4MXX8Fba #tryhackme #CVE-2020-1472… https://t.co/Y9asxjhas2 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1354361358817452032yg_chappie
2021-01-24 06:40:10CVE-2020-1472 - Zerologon Exploit POC #Zerologon #Exploit #CVE-2020-1472 #CyberSecurity #DataCenterHack #RedTeam… https://t.co/yZR397j4NB https://twitter.com/i/web/status/1353230530955735047reconshell
2021-01-23 03:40:04おお、AD脆弱性[CVE-2020-1472]、通称ZerologonのStep2(安全でないRPC接続の強制切断)は2/9以降でパッチ配布とな。完全に忘れておった。。。Le7Wy
2021-01-22 14:10:17New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/wH8GLNnxZ7 https://lnkd.in/e6C57pUAAairom
2021-01-21 09:51:12📌Microsoft Zerologon Zafiyeti‼️ Microsoft, 9 Şubat tarihinden itibaren CVE-2020-1472 numaralı Zerologon zafiyetini… https://t.co/TnFSqGO5PF https://twitter.com/i/web/status/1352190657822138368UITSEC
2021-01-21 09:50:48⚠️ Upcoming #ActiveDirectory security update of February 9! 🛡️ The 2nd phase of the #ZeroLogon (CVE-2020-1472) miti… https://t.co/OIMmxbRJo1 https://twitter.com/i/web/status/1352191446665846785cnotin
2021-01-21 07:01:10Be prepared to the February 9 #Security Update, #Zerologon, CVE-2020-1472 https://t.co/OucTKARM7G #Microsoft… https://t.co/ODNHUSOsKf https://msrc-blog.microsoft.com/2021/01/14/netlogon-domain-controller-enforcement-mode-is-enabled-by-default-beginning-with-the-february-9-2021-security-update-related-to-cve-2020-1472/ https://twitter.com/i/web/status/1352147653350608896jeanclaudebpro
2021-01-20 13:40:04非準拠クライアントなヤツ / “[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 – Microsoft Security Response Center” https://t.co/MN54tjdvIN https://htn.to/3QE1u8RiJewaiha8
2021-01-18 12:50:03Will cause some fun for those ignoring this exploit CVE-2020-1472 #Zerologon flaw. https://t.co/9zOTsalm97 https://threatpost.com/microsoft-implements-windows-zerologon-flaw-enforcement-mode/163104/lmeyler
2021-01-18 03:21:06Zero Logon - I have just completed this room! Check it out: https://t.co/lLdxSEdW8d #tryhackme #CVE-2020-1472… https://t.co/5vRqopdZDs https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1350738074880249858gunjin1
2021-01-17 18:40:05CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2021-01-16 18:30:06CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2021-01-15 21:50:08#Microsoft warn admins that #Zerologon (CVE-2020-1472) #vulnerability update will transition into the enforcement p… https://t.co/BusyCjhex5 https://twitter.com/i/web/status/1350197325340303368twelvesec
2021-01-15 18:30:06CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2021-01-15 15:40:03Microsoft Reminds Organizations of Upcoming Phase in Patching Zerol... (Securityweek) Tracked as CVE-2020-1472 and… https://t.co/BeuwjqszuP https://twitter.com/i/web/status/1350104887497875456InfoSec_b
2021-01-15 10:00:03Start by bookmarking these technical guides: 1️⃣ How to use vuln chaining to exploit #Zerologon (CVE-2020-1472):… https://t.co/a3QLjmvFQ5 https://twitter.com/i/web/status/1350018832233082880pentesttoolscom
2021-01-15 07:30:03MSFT addressed a Critical RCE vuln affecting Netlogon (CVE-2020-1472) on Aug 11 2020. Reminder that beginning with… https://t.co/55VNWqLza5 https://twitter.com/i/web/status/1349981856016470016holisticinfosec
2021-01-15 02:50:02【ニュース】 ・CVE-2020-1472の第2弾アップデートについて、MSより記事公開 Netlogon Domain Controller Enforcement Mode is enabled by default beg… https://t.co/dZg760q2Gx https://twitter.com/i/web/status/1349910536373239808BlogLoki
2021-01-15 00:30:02NetApp ONTAP 8.2.x 7-modeで使い続けている環境はActive Directoryサーバに2月適用予定のnetloginのセキュアチャネルに関する脆弱性CVE-2020-1472の修正が適用されるとアクセスで… https://t.co/cTjnZoSCRp https://twitter.com/i/web/status/1349875920690036738osakanataro2
2021-01-13 11:00:12I had some spare time and decided to automate for some known CVE's. The first is ZeroLogOn (CVE-2020-1472) Would y… https://t.co/aTE31FGVQs https://twitter.com/i/web/status/1349308896960241666avitansahar
2021-01-13 03:22:59CVE-2020-1472 対応パッチを当てるにはWindows Server 2012以降でないといけない(例の延長サポートなしの場合) > Windows Server 2012のAD最低の機能レベルは2003 > ま、まさか… https://t.co/MrjaiaPo0x https://twitter.com/i/web/status/1349190099397865473g_plains
2021-01-13 01:01:23来月AD環境への重要な設定変更の更新が3つ有り:AD管理者の方は改めて環境の準備のご確認をお願いします:変更①2020年8月に修正を公開したCVE-2020-1472 Netlogon (Zerologon)への対応として安全な… https://t.co/CRaEAgKlJv https://twitter.com/i/web/status/1349156979357282304EurekaBerry
2021-01-12 09:40:04ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/if1Tt37KgF #InfoSec #CyberSecurity #ZeroLogon #Netlogon #CVE #Windows https://blog.zsec.uk/zerologon-attacking-defending/s3xcur1ty
2021-01-11 17:40:23Zerologon : Instantly Become Domain Admin by Subverting Netlogon Cryptography (CVE-2020-1472) : https://t.co/WgkHTYkMTw https://aeternusmalus.wordpress.com/2021/01/11/zerologon-instantly-become-domain-admin-by-subverting-netlogon-cryptography-cve-2020-1472/Djinn3301
2021-01-11 16:50:09Zerologon : Instantly Become Domain Admin by Subverting Netlogon Cryptography (CVE-2020-1472) :… https://t.co/IAKJQJv4fs https://twitter.com/i/web/status/1348672721790541824binitamshah
2021-01-08 17:10:10https://t.co/Lw9zFPoCR1 Actual footage of Tom Tervoort fucking finding CVE-2020-1472. What an actual fucking mad lad. https://youtu.be/AcmaNJfRQf0gir489
2021-01-08 09:20:06Does anyone know if CVE-2020-1472 is public yet? I don’t want to pay $500 in Monero to see this exploit. It’s bad but it’s not $500 bad.gir489
2021-01-07 13:10:04Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range #splunkBlogshernanespinoza
2021-01-06 19:10:06ثريد عن ثغرة Zerologon : Unauthenticated domain controller ( CVE-2020-1472) الثغرة تصيب: Netlogon Rmote protoco… https://t.co/ZLNMDz8Swr https://twitter.com/i/web/status/13468946722376335460xFahad
2021-01-05 07:40:02去年公開された脆弱性の話なので忘れられていると思いますが、2 月の Windows Update で以下が強制フェーズに移行するので管理者の皆々様におかれましてはお気をつけくださいますよう - CVE-2020-1472 (Ne… https://t.co/YDtRMIS3AY https://twitter.com/i/web/status/1346359850318458882Liliaceae
2021-01-03 18:40:03CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2021-01-03 16:00:04Hack into windows server 2012 R2 domain controller without password by exploiting CVE-2020-1472 (CVSS rating 10/10)… https://t.co/YC5R3ILzQp https://twitter.com/i/web/status/1345760144899104775WrathfulDiety
2021-01-02 19:40:02@SolarisUpdate, CVE-2020-1472. Solaris 11 ZFS SMB is not compliant and will be disallowed from connecting to AD af… https://t.co/z2kj2VJbPe https://twitter.com/i/web/status/1345453768658145280cmdr112a
2021-01-02 17:10:03In August a patch was released for CVE-2020-1472 (ZeroLogon), in September technical details were released by… https://t.co/mCqEb3Dmrb https://twitter.com/i/web/status/1345416520441221121cglyer
2021-01-01 16:20:042020/09 - ドコモ口座の不正出金 - ゆうちょ銀行でも不正出金 - Zerologon(CVE-2020-1472)でざわつく - BSいきものがかり DIGITALFES2020、よかったが音楽番組との違いはどこか感 -… https://t.co/TsSuQC1qJ4 https://twitter.com/i/web/status/1345041207659876352hijili2
2020-12-27 22:10:03CVE-2020-1472 : ZeroLogon https://t.co/KE3zh41kvo @100security #100security https://t.co/Ek3ow1HYbU https://www.100security.com.br/cve-2020-1472100Security
2020-12-24 17:20:03CVE-2020-1472への対応しなくちゃとマイクロソフトのサイトを何度読んでも、 ぜんっぜんどんな悪用ができるのか意味わかんなかったけど、 この説明見たらやばい脆弱性だってようやく分かった (´-﹏-`;)やだなぁ https://t.co/75NVgm8Onf https://twitter.com/fwarashi/status/1308434823682244608kiryuumomoka
2020-12-22 15:10:13A critical vulnerability has been found in the #Netlogon Remote Protocol (MS-NRPC) (CVE-2020-1472) and can be explo… https://t.co/CSNP6tF8ox https://twitter.com/i/web/status/1341398093460348928certbe
2020-12-22 15:10:13Une vulnérabilité critique a été trouvée pour #Netlogon Remote Protocol (MS-NRPC) (CVE-2020-1472) et peut être expl… https://t.co/KCB6ehRPQi https://twitter.com/i/web/status/1341398092650663937certbe
2020-12-22 15:00:03Een kritieke kwetsbaarheid is gevonden in the #Netlogon Remote Protocol (MS-NRPC) (CVE-2020-1472) en kan misbruikt… https://t.co/rmcpGM6ePt https://twitter.com/i/web/status/1341398091740696586certbe
2020-12-20 17:00:03Don't think that #pay2key are expert or talented, they used Zerologon vulnerability (CVE-2020-1472) to access the I… https://t.co/Yy3YG1YF3i https://twitter.com/i/web/status/1340702660022968320EmbeddedOle
2020-12-14 14:40:05CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/sgveHHDlli @YouTubeより もう少しで100高評価…ッ! https://t.co/6ePxFGDFbo https://youtu.be/1h_wlMWwyB4fwarashi
2020-12-14 10:10:07Yerel ağ sızma testi uzmanları için iyi, sistemciler için ise kötü bir haber: CVE-2020-1472. İlgili zafiyet ile bir… https://t.co/sjBtawgdf5 https://twitter.com/i/web/status/1338423601477902336dailypentest
2020-12-13 09:00:08Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/IvjbLnXBio #InfoSec… https://t.co/0i562CGOwK https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html https://twitter.com/i/web/status/1338044893181177856s3xcur1ty
2020-12-10 23:14:08IPS:15156 Windows Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) 2 IPS:15158 Windows Netlogon Elevat… https://t.co/VWG3859URc https://twitter.com/i/web/status/1337171848706998277BRChelmo
2020-12-09 21:20:44@hkashfi Who cares about DC vulnerabilities? In any case, Organizations are still vulnerable to CVE-2020-1472.ho_lajevardi
2020-12-09 19:40:12#zerologon CVE-2020-1472 @PwnieAwards 2020 Best Cryptographic Attack https://t.co/tVbsb06Mwx https://t.co/VpQAXlk112 https://pwnies.com/winners/daniel_bilar
2020-12-09 13:10:05CVE-2019-11510 CVE-2020-1472 CVE-2018-13379 CVE-2018-15961 CVE-2019-0604 CVE-2019-0708 CVE-2019-11580 CVE-2019-1978… https://t.co/K86lEXNX7S https://twitter.com/i/web/status/1336658551100616704brunoagostinho
2020-12-09 10:00:19Listado de CVEs por orden de criticidad: CVE-2019-11510 CVE-2020-1472 CVE-2018-13379 CVE-2018-15961 CVE-2019-0604… https://t.co/NgMpiAriDK https://twitter.com/i/web/status/1336609174692704258AlvaroVallega_
2020-12-09 00:10:03AD Security Experts; Once you move to enforcement mode for secure RPC for CVE-2020-1472, does 'restrictions for una… https://t.co/qcDthnDxxP https://twitter.com/i/web/status/1336462915923152897DXPetti
2020-12-09 00:10:02CVE-2020-1472 details: https://t.co/JP15IT1s6n https://support.microsoft.com/en-au/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocDXPetti
2020-12-08 14:40:06Zerologon(CVE-2020-1472)のpcapファイルからはジュゴーン(みず)が召喚された。 脆弱性の破壊力の割に、召喚されたモンスターは弱っちい。 https://t.co/py42RNDq74v_avenger
2020-12-08 14:40:05CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/sgveHHDlli @YouTubeより 隙きあらば宣伝 https://t.co/tGPLd1nYTN https://youtu.be/1h_wlMWwyB4 https://twitter.com/fwarashi/status/1336317642328567808fwarashi
2020-12-06 20:50:03ZeroLogon Exploit - Abusing CVE-2020-1472 (Way Too Easy!) https://t.co/xBp1EC7LQw https://www.youtube.com/watch?v=6xMGsdD-ArIIbraheem_111
2020-12-06 16:10:03Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/vusOL9XXM2 https://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.htmlvjgils
2020-12-06 16:10:02Ataques de #Zerologon Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/vusOL9XXM2 https://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.htmlvjgils
2020-12-05 02:30:17Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/x1BMEbjpXy http://dlvr.it/Rn1mzSd_a_gallardo
2020-12-04 11:20:20Durante este taller, el profesor e investigador nos explica los detalles de la #vulnerabilidad CVE-2020-1472, descr… https://t.co/Zp70VGLXJv https://twitter.com/i/web/status/1334818867940646912CCNCERT
2020-12-03 15:42:23Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/4kE92wZydT http://dlvr.it/RmwX0Cprofesortech
2020-12-03 10:00:08⚠️ رول اسپلانک جهت تشخیص حمله مبتنی بر آسیب پذیری Zerologon شناسه آسیب پذیری CVE-2020-1472 شرح آسیب پذیری: با سو ا… https://t.co/O6PRUeGO2X https://twitter.com/i/web/status/1334435724939051008Forcedalas
2020-12-03 09:50:09ZeroLogon Exploit Windows CVE-2020-1472 https://t.co/Idx1niQkjf https://m.youtube.com/watch?v=6xMGsdD-ArIForcedalas
2020-12-03 00:50:06CVE-2020-1472 / USN-4559-1redkepeng
2020-12-02 19:40:08Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/qzaAdhxz8j https://buff.ly/3g2Y8mYnicoboettcher
2020-12-02 18:30:25CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-12-02 09:00:12Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/7FxRfBLh16 #InfoSec… https://t.co/enJAPEnqZU https://github.com/dirkjanm/CVE-2020-1472 https://twitter.com/i/web/status/1334058761485508608s3xcur1ty
2020-12-02 08:11:12#earmas RT SeguInfo: Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/bFKS82YVf5 https://j.mp/3lsCYztApostolWario
2020-12-02 08:01:53Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/QZBHLFPVGl http://ow.ly/bYxK30rmIplDYSTEC
2020-12-01 23:20:07Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472. https://t.co/d9XtChXPcI https://t.co/duycsUZGVE https://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.htmlDragsterSystems
2020-12-01 22:30:49“Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472” https://t.co/RoUXcnTfzt v… https://t.co/2AVp4XYhYy https://buff.ly/3mv8KNB https://twitter.com/i/web/status/1333898864059932672nethome_mx
2020-12-01 19:30:29Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/vmm8K6O6lq http://feedproxy.google.com/~r/NoticiasSeguridadInformatica/~3/v0-ctIFQtH4/ataques-de-zerologon-tomar-accion.htmljccall80
2020-12-01 19:22:38Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/E3oX2x8jzG… https://t.co/cIrDuFGiNK https://buff.ly/2Vnp9I3 https://twitter.com/i/web/status/1333851107953676291Jimenezsgbriela
2020-12-01 18:30:39Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/0oY8qLbRbS http://dlvr.it/RmnZcXvjgils
2020-12-01 18:20:17Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/neV4woC9E2 http://dlvr.it/RmnXsqpierregb
2020-12-01 18:20:07Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/dXCoZnde3R http://dlvr.it/RmnYVJM3XT4R
2020-12-01 18:11:47Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/6lM7Ou60cR http://dlvr.it/RmnVhFromer_u
2020-12-01 18:11:43Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/vSYp1NsRhj https://j.mp/3lsCYztSeguInfo
2020-12-01 17:50:22Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/bQuIxI1gA9 http://dlvr.it/RmnRl0w00z_
2020-12-01 17:20:08Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/2P0C3f5y1t http://dlvr.it/RmnMmDjesusMamoros
2020-12-01 17:10:03Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/SnVsaNtakT http://dlvr.it/RmnLPpvictor_hglz
2020-12-01 16:57:53Seguinfo: Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/VjnOO2iiSZ https://ift.tt/2VnblNLSeguridadula
2020-12-01 16:53:41Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/OYh9Iva5FO http://dlvr.it/RmnGDnBringITON_CA
2020-12-01 16:30:19Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/DbzEE5iAEO https://t.co/L66dbMoIUF https://ift.tt/2VnblNLMicrohardpc
2020-12-01 16:30:11Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/gVExjxKd2N http://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.htmlSociabilidad
2020-12-01 16:20:27Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/1h521Odo5W https://ift.tt/2VnblNLedcamposj
2020-12-01 16:00:21[Recomendado]Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472… https://t.co/1NHiimkV5L https://twitter.com/i/web/status/1333801539480109068seguridad_si
2020-12-01 16:00:15Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/2FCp0EimoW https://ift.tt/2VnblNL3m1l
2020-12-01 16:00:09Ataques de #Zerologon. Tomar acción inmediata para actualizar #KB4557222 #CVE-2020-1472 https://t.co/VUPsjrCbWX via @seguinfo #InfoSec http://blog.segu-info.com.ar/2020/12/ataques-de-zerologon-tomar-accion.htmlth3hutt
2020-12-01 09:00:12“If you have yet to install CVE-2020-1472 on your Windows servers, do so immediately” warns Dominic Bland “It will… https://t.co/NvPY0ja6aH https://twitter.com/i/web/status/1333696095197802497FirstResponseEu
2020-12-01 00:50:06CVE-2020-1472 Netlogonの脆弱性、通称「Zerologon」をMicrosoft Defender で検出して対応可能に:https://t.co/b29L4lkWSX https://www.microsoft.com/security/blog/2020/11/30/zerologon-is-now-detected-by-microsoft-defender-for-identity/EurekaBerry
2020-11-30 23:00:38There's been a lot of focus on ZeroLogon (the recently patched CVE-2020-1472). Learn about how Microsoft Defender f… https://t.co/XXDGGA3aN9 https://twitter.com/i/web/status/1333544318858973184MSThreatProtect
2020-11-26 18:50:15「CVE-2020-1472 Netlogon の特権の昇格の脆弱性」の対応のためにドメインコントローラーに順次パッチを適用中。 Windows Server 2012以降は問題なし。 しかしWindows Server 200… https://t.co/GKpbeLDHXE https://twitter.com/i/web/status/1332033271618703360norimaki2000
2020-11-24 07:50:15Zerologon Vulnerability: Becoming a domain admin in 10 seconds CVE-2020-1472: https://t.co/xNKCM6rvw4… https://t.co/PahgpmCw4e https://bit.ly/35KpV8c https://twitter.com/i/web/status/1331142314958483457secforeveryone
2020-11-23 18:40:34CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-11-23 13:40:10Zero Logon - I have just completed this room! Check it out: https://t.co/aVudYLiD9F #tryhackme #CVE-2020-1472… https://t.co/1JSur3o5gh https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1330867161959706628AdamaSitou
2020-11-22 23:10:05Windows Serverの脆弱性「Zerologon(CVE-2020-1472)」を悪用した攻撃に強い警戒感、ADサーバ利用企業は早急な対応を~2020年10月の気になるセキュリティニュース~|SecureOWL|KCCS https://t.co/BCXTlzl4RS https://www.kccs.co.jp/secureowl/column/column10041.htmlnichii_a
2020-11-21 07:50:03A security firm named @securabv has published a white paper of a vulnerability (CVE-2020-1472) affecting Microsoft'… https://t.co/Gx8wTDGFIW https://twitter.com/i/web/status/1330055152175353856secforeveryone
2020-11-20 17:00:03Windows Serverの脆弱性「Zerologon(CVE-2020-1472)」を悪用した攻撃に強い警戒感、ADサーバ利用企業は早急な対応を~2020年10月の気になるセキュリティニュース~|SecureOWL|KCCS https://t.co/ZLqR8aCcvL http://dlvr.it/Rm5jSNnichii_a
2020-11-20 00:40:05Zerologon:Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/5v59HG9Xve https://twitter.com/i/web/status/1329584520593629185malwaresick
2020-11-19 23:42:50はてなブログに投稿しました #はてなブログ 中華系ハッキンググループAPT10によるZeroLogonの脆弱性(CVE-2020-1472)を悪用した新たな攻撃の観測について - みっきー申す https://t.co/V5Q8eF83w5 https://micro-keyword.hatenablog.com/entry/2020/11/20/082956microkeyword
2020-11-19 11:40:03中國APT駭客組織鎖定日本組織發動攻擊,並企圖打造濫用Zerologon漏洞的工具 https://t.co/H8EXsN8lDY 能夠讓駭客取得網域控制權的Zerologon漏洞(CVE-2020-1472),在今年9月底開始被… https://t.co/WneEZ5iEC7 https://www.ithome.com.tw/news/141219 https://twitter.com/i/web/status/1329388039718617089M157q_News_RSS
2020-11-19 09:10:14C'mon people, patch that Zerologon vuln! Massive hack hits companies around the world #CVE-2020-1472… https://t.co/2uwgbbbhIY https://twitter.com/i/web/status/1329349753944076288OliverRochford
2020-11-18 23:40:47Active Directoryの脆弱性「Zerologon (CVE-2020-1472)」に要注意! :Netlogonに潜む特権昇格バグの脅威とその対策 https://t.co/Vy3Y8b9m3s https://blogs.manageengine.jp/domain-controller-patch-alert-vulnerability/?utm_source=nllhtml&utm_medium=zcmlr&utm_campaign=November2020m8oakl
2020-11-18 23:30:06マイクロソフトが公開したADの重大な脆弱性(CVE-2020-1472)を悪用した攻撃「Zerologon」m8oakl
2020-11-15 22:00:03@anthomsec @arekfurt That, and they should actually patch CVE-2020-1472 (and everything else). These speedrun ra… https://t.co/txD6E7GENy https://twitter.com/i/web/status/1328094494605000704JimSycurity
2020-11-15 18:20:09CVE-2020-1472 putting Time To RYUK into two hours. You could go to an hour long company all hands, and then lunch,… https://t.co/PKzmIxMLrK https://twitter.com/i/web/status/1328038372418478081anthomsec
2020-11-11 11:20:33The recent disclosure of CVE-2020-1472 vulnerability showcases the need for tools that allow defenders to quickly r… https://t.co/IE38ZiQ4xQ https://twitter.com/i/web/status/1326482708948791296blackcellteam
2020-11-10 18:30:08CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-11-10 01:30:02YES! WinPwn now checks all domain controllers of the current domain for zerologon - CVE-2020-1472 https://t.co/z3WMs4zhcu https://twitter.com/ShitSecure/status/1325856474439028739jessefmoore
2020-11-09 21:40:03Aporte de como funciona Zerologon (CVE-2020-1472) contra un servidor con Rol de Controlador de Dominio y crackeo de… https://t.co/3GLHAVGfMa https://twitter.com/i/web/status/1325915186344157184JorgeMarva
2020-11-09 17:50:10WinPwn now checks all domain controllers of the current domain for zerologon - CVE-2020-1472 🥳 So easy to exploit… https://t.co/jY6QaNAKzr https://twitter.com/i/web/status/1325856474439028739ShitSecure
2020-11-09 15:10:05A different way of abusing Zerologon (CVE-2020-1472) https://t.co/UHQaoptVuz https://dirkjanm.io/a-different-way-of-abusing-zerologon/HANIALSULAMIx
2020-11-09 13:00:05O meu post sobre o ZeroLogon (CVE-2020-1472) está bombando. Seria por conta do que aconteceu no STJ ?… https://t.co/VYeTFv0Xl4 https://twitter.com/i/web/status/1325783172169277442DanielDonda
2020-11-09 01:20:03@akirakia CVE-2020-1472 の脆弱性対応でアクセスできなくなる NAS が多発してるという事例にぶち当たった今日このごろgarathea
2020-11-06 22:50:07Biden : 264 Trump : 214 MSFT: CVE-2020-1472helmorchadi
2020-11-06 19:20:31@LoLrenzoL CVE-2020-1472 CVE-2020-3992 CVE-2019-5544 foram essas as vulnerabilidades que eles exploraramollemg
2020-11-06 17:50:19#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/8ZBVloa5Ff https://twitter.com/i/web/status/1324769781694799879eve_rco
2020-11-06 14:50:09#Microsoft issued the patch for CVE-2020-1472 (#Zerologon), a vulnerability that allows an attacker to elevate to t… https://t.co/Fbvn1WvLvO https://twitter.com/i/web/status/1324725492168220675KrollWire
2020-11-06 12:10:18@BleepinComputer Internal sources alleged CVE-2020-1472 (Zero Logon) has been exploited as well as CVE-2019-5544 and CVE-2020-3992.BruteBee
2020-11-05 22:30:05CVE-2020-1472 (Zerologon) Exploit Detection Cheat Sheet https://t.co/8ggVz3f1Rx https://www.kroll.com/en/insights/publications/cyber/cve-2020-1472-zerologon-exploit-detection-cheat-sheetkirtanSec
2020-11-05 20:00:51Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/kd0mxnz2SE https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/sarmentots
2020-11-05 19:40:14Worth a read: Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/L9FXoYqxuV https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/SteveSyfuhs
2020-11-05 14:00:11すごい。分かった気になれたw CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/XDCRaACRzA @YouTubeより https://youtu.be/1h_wlMWwyB4ionis_h
2020-11-05 08:10:21Microsoft Warns of Continued Exploitation of CVE-2020-1472 Original release date: October 29, 2020 Microsoft has r… https://t.co/ywVEQi8rog https://twitter.com/i/web/status/1324261228794007557threatmeter
2020-11-04 16:21:20You’ve probably heard about CVE-2020-1472, also known as ZeroLogon, by now. Team Ambush decided to put this exploit… https://t.co/OOOYqT7iVB https://twitter.com/i/web/status/1324021256098820097FRSecure
2020-11-04 03:50:18CVE-2020-1472 MSの当初リスク評価低かったのに 別機関で10段階中10なのね😱 >RTmaccha1030
2020-11-03 18:30:05CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-11-03 17:40:14#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/xfS2psVN03 https://twitter.com/i/web/status/1323680330998517761ITANALYTICS_MX
2020-11-03 12:00:20If you work at a company that has an unpatched domain controller for CVE-2020-1472, tell your admins about 0patch. https://t.co/yJDfMiHiy10patch
2020-11-03 09:42:11Рецепты по обнаружению фактов эксплуатации уязвимости #Zerologon (CVE-2020-1472) от команды https://t.co/JKNSB9nRWm… https://t.co/FK0JhXJgkP http://BI.ZONE https://twitter.com/i/web/status/1323560979414814720BlackMatter23
2020-11-03 09:21:15CVE-2020-1472 a.k.a. Zerologon attacker without credentials elevate highest privileges in domain Credentials compro… https://t.co/JBpQ3nxuCh https://twitter.com/i/web/status/1323553455038963712GomisHenk
2020-11-03 08:50:16#cybercrime, threat actors continue to exploit CVE-2020-1472 vulnerability. @Microsoft #CyberSecurity experts: It… https://t.co/aa94yCvqa2 https://twitter.com/i/web/status/1323546437033041921FBussoletti
2020-11-03 06:51:27#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/p13I7ICtls https://twitter.com/i/web/status/1323516526830518272OberbergOnline
2020-11-02 16:00:04Microsoft Warns of Continued Exploitation of CVE-2020-1472 - https://t.co/6WFo3Fn0Mw #news https://buff.ly/3kLYyzmRisingCyberLLC
2020-11-02 10:50:02Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/s52sy0Nc87 https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/HenkvanRoest
2020-11-01 23:10:02[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/1ed7alf6eA https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/Rikunchuu
2020-11-01 18:40:15CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-31 18:40:03If you work at a company that has an unpatched domain controller for CVE-2020-1472... quitNolan_Mcfly
2020-10-31 18:30:17CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-31 18:00:05Microsoft Warns of Continued Exploitation of CVE-2020-1472 Original release date: October 29, 2020 Microsoft has re… https://t.co/QP9dhrJ9Gv https://twitter.com/i/web/status/1322598728780361729InfoSecHotSpot
2020-10-31 15:10:11Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/EKnzhcVkDu #uscert #gov https://buff.ly/3myDtJhNotTruppi
2020-10-31 13:20:09Microsoft Warns of Continued Exploitation of CVE-2020-1472 - https://t.co/857KxzDFRj #news https://buff.ly/31XHTByandrewsmhay
2020-10-31 13:10:33Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/2WlCysD8tj https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/samilaiho
2020-10-31 13:10:27Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/aVfEDnI57Q https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/Alshakarti
2020-10-31 07:30:16Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/uFNXx72qXc https://ift.tt/3jF1f4Bbug_less
2020-10-31 05:10:39Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/bdJWM7TAcG #MSFTAdvocate https://lnkd.in/dbmv_CqCriticalBoss
2020-10-31 02:10:44Microsoft Warns of Continued Exploitation of CVE-2020-1472 #ZeroLogon #CyberSecurity https://t.co/Klr3vjI5eq https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472?utm_medium=email&_hsmi=98641688&_hsenc=p2ANqtz-915sC3xBzfoaBtrRegVn8huIleMlCYCRbfu4rWedWM4B7eyIMq3wuvhJnW8f336geAaUmZQB7p4rOytw3Un_W9zWud2t8kQ3X1lXhjl-Hc01eOVjc&utm_content=98641688&utm_source=hs_emailmalwaresick
2020-10-31 00:10:04Attacks exploiting Netlogon vulnerability (CVE-2020-1472) – Microsoft Security Response Center https://t.co/tQGcjcQr8n https://buff.ly/34EGh1iJasonWiele
2020-10-30 21:21:12CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 https://t.co/Rn0qCsiZ3a https://support.microsoft.com/ja-jp/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocmuupapa
2020-10-30 21:00:16Microsoft Warns of Continued Exploitation of CVE-2020-1472 #Anonymous https://t.co/9ZoJ2hF04G https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/AnonAnonymous
2020-10-30 19:30:06Netlogon: Microsoft Warns of Continued Exploitation of CVE-2020-1472 ( https://uscert. https://t.co/P9qqA4g1h4 cve-… https://t.co/EBnixL3Qet http://cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continuedexploitation- https://twitter.com/i/web/status/1322257514352668673cal_csic
2020-10-30 19:20:09Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/l32r6MltQC http://aka.ms/AAa4wr6bsuneja
2020-10-30 18:31:08CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-30 18:25:07Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/WKhphMGjE3 via @USCERT_gov http://dlvr.it/Rkbz0SAcooEdi
2020-10-30 18:06:04Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/WKhphMGjE3 via @USCERT_gov http://dlvr.it/Rkbz0SAcooEdi
2020-10-30 16:40:19Microsoft warns that the Zerologon vulnerability (CVE-2020-1472) in Netlogon continues to be exploited in the wild https://t.co/Ftysb3LH67 https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/virusbtn
2020-10-30 16:40:14Microsoft Warns of Continued Exploitation of CVE-2020-1472 | CISA https://t.co/1PU8U3wkN1 < The patch for this was… https://t.co/8UPxfgfbDy https://buff.ly/3myDtJh https://twitter.com/i/web/status/1322216243634589697bschorr
2020-10-30 16:40:08Attacks exploiting #Netlogon #vulnerability (CVE-2020-1472) https://t.co/hNNfjiBJoP https://www.tenforums.com/windows-10-news/167409-attacks-exploiting-netlogon-vulnerability-cve-2020-1472-a.htmlShawn_Brink_MVP
2020-10-30 16:40:05Microsoft Warns of Continued Exploitation of CVE-2020-1472 | CISA https://t.co/mdnVANKuvU https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472rodtrent
2020-10-30 16:30:09Microsoft Warns of Continued Exploitation of CVE-2020-1472 | CISA https://t.co/OJoTzHEUbG #cybersecurity… https://t.co/uBQK9fJ3KH https://buff.ly/3myDtJh https://twitter.com/i/web/status/1322213743816790016NcuIsao
2020-10-30 16:30:07@Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/QCV49fcITB #PatchYourShit https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472geekymalcolm
2020-10-30 16:20:06#Zerologon – Find out more about the CVE-2020-1472 vulnerability ➡️ https://t.co/JZjXAhl2dY #cybersecurity https://t.co/0IdLksltPb https://www.stormshield.com/news/cve-2020-1472-zerologon-targeting-corporate-networks/?utm_source=twitter&utm_medium=social&utm_campaign=organic_postStormshield
2020-10-30 15:50:05Microsoft Warns of Continued Exploitation of CVE-2020-1472 Microsoft has released a blog post on cyber threat acto… https://t.co/X2TXq9eDpd https://twitter.com/i/web/status/1322201166823018497AlirezaGhahrood
2020-10-30 15:50:05Microsoft warns of ongoing exploits against Zerologon vulnerability (CVE-2020-1472) https://t.co/jW4VoujP7m… https://t.co/36YeNiESDf https://buff.ly/2JdjLnY https://twitter.com/i/web/status/1322200891680849923securezoo
2020-10-30 15:30:11Update your servers and computers!!! Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/aDwwXq733m https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ITMS_NV
2020-10-30 15:20:17Microsoft Warns of Continued Exploitation of CVE-2020-1472 #cybersecurity #threat https://t.co/TU7ery20J3 https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472hintz2010
2020-10-30 14:50:36#MSRC #ActiveDirectory #EOP Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/oWkHkFUmun https://bit.ly/3jIbB3xSasStu
2020-10-30 14:30:07Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/0lMQSF4eUb https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472SecureNetIT
2020-10-30 14:20:11Microsoft Warns of Continued Exploitation of CVE-2020-1472 Microsoft has released a blog post on cyber threat acto… https://t.co/RPDgiAFPkN https://twitter.com/i/web/status/1322181023766106113DoITSecurity
2020-10-30 12:30:16I wonder how many people patched CVE-2020-1472 but did not do the needed aftercare to make it actually work...n3tb4dg3r
2020-10-30 11:10:33@CISAgov issued a patch validation script for #Zerologon (CVE-2020-1472) that checks if appropriate updates are ins… https://t.co/DDDIQGTNlT https://twitter.com/i/web/status/13221319705503580160patch
2020-10-30 11:10:12Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/ngh8YqyOob https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472ralucasaceanu
2020-10-30 11:00:08#HotTopic CVE-2020-1472 #patching reminder >> 4 steps UPDATE/FIND/ADDRESS/ENABLE https://t.co/wDK5rGNMqE https://t.co/GlujIp073E https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/pdominjon
2020-10-30 10:10:54SonicWall: protezione attiva per CVE-2020-1472 (Microsoft NetLogon) https://t.co/tztrCSBi3T https://www.alias.it/news/2020/sonicwall-protezione-attiva-per-cve-2020-1472-microsoft-netlogon-/#.X5vlsm1VXZw.twitterAlias_Srl
2020-10-30 09:30:39#Zerologon - Détails sur la vulnérabilité CVE-2020-1472 ➡️ https://t.co/OQNsZHjFDs #cybersécurité https://t.co/tHGxFCt3lr https://www.stormshield.com/fr/actus/cve-2020-1472-zerologon-les-reseaux-entreprise-dans-le-viseur/?utm_source=twitter&utm_medium=social&utm_campaign=organic_postStormshield
2020-10-30 08:40:06Microsoft Warns of Continued Exploitation of CVE-2020-1472: https://t.co/oDy59Slnu2 #follow & #RT #cybersecurity #infosec https://ift.tt/3jF1f4BKeoXes
2020-10-30 08:20:04Attacks exploiting Netlogon vulnerability (CVE-2020-1472) – Microsoft Security Response Center https://t.co/A5TRL8ZQWb https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/Secnewsbytes
2020-10-30 07:40:06セキュリティ関連のニュース記事などで取り上げられることが多い Zerologon ですが、これは Netlogon の脆弱性で、マイクロソフトからは 2020 年 8 月に脆弱性情報 CVE-2020-1472 を公開しています。 https://t.co/jz2LIinspU https://support.microsoft.com/ja-jp/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assockristinayasuda
2020-10-30 07:30:48แจ้งเตือน พบการโจมตีช่องโหว่ Zerologon (CVE-2020-1472) ควรรีบแพตช์และตรวจสอบการตั้งค่าเซิร์ฟเวอร์เพื่อลดความเสี่ยง https://t.co/yXY4r9Up2Q https://www.thaicert.or.th/newsbite/2020-10-30-01.htmlThaiCERT
2020-10-30 07:11:15Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/FiY78xfjnF #CERT #CyberSecurity #InfoSec #SOC #TousSecNum https://bit.ly/34FKK41cyberdian_cert
2020-10-30 07:10:46Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/eiguReuPkx https://ift.tt/3jF1f4Bcyberbuzznews
2020-10-30 07:10:23Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/OTwnNds6xY https://t.co/JC0KYlMCSu https://ift.tt/3jF1f4Bgeektech713
2020-10-30 07:00:18Attacks exploiting Netlogon vulnerability (CVE-2020-1472) - Deploying the August 11, 2020 security update or later… https://t.co/Tfpf1nojma https://twitter.com/i/web/status/1322069680635453440Ourghanlian
2020-10-30 07:00:09Microsoft warning on Windows ZeroLogon vulnerability, CVE-2020-1472. #CVE-2020-1472 #NetLogon #ZeroLogon https://t.co/WpAhiYRZOS https://thelateralsecurity.com/2020/10/30/microsoft-warns-against-an-attacks-exploiting-netlogon-vulnerability/AndSiem
2020-10-30 06:20:07NetLogon privilege escalation vulnerability, CVE-2020-1472 #CVE-2020-1472 #NetLogon #PrivilegeEscalation #ZeroLogon https://t.co/FxbuI8USEZ https://thelateralsecurity.com/2020/10/30/cve-2020-1472-netlogon-elevation-of-privilege-vulnerability/AndSiem
2020-10-30 04:10:09Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/mMHisew8B7 https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472microkeyword
2020-10-30 03:10:06Microsoft Warns of Continued Exploitation of CVE-2020-1472, an elevation of privilege vulnerability in Microsoft’s… https://t.co/pH9qjDGZfj https://twitter.com/i/web/status/1322012850433396736privsecguy
2020-10-30 02:50:12Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/NFCJiabzle https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/RyushiAhnam
2020-10-30 02:10:04Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/iXrBq7kzKw https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472aesj8
2020-10-30 02:00:04#cybersecurity - Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/pKLnXW9WYe https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472empressbat
2020-10-30 01:20:44CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 - マイクロソフト(2020/10/30) https://t.co/KfbWJVVghR https://support.microsoft.com/ja-jp/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocspread_jp
2020-10-30 01:20:37Patch! And follow guidance please. Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/NX8rnRdqKj https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ajohnsocyber
2020-10-30 01:20:22詳細手順出ていたのですな。全てのAD管理者はチェックすべし:CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 https://t.co/m1iHi1bxZT https://itnews.org/news_resources/235250tamosan
2020-10-30 01:00:19#Attacks #exploiting #Netlogon #vulnerability (CVE-2020-1472) https://t.co/hOg9FSQq0t https://bit.ly/2TCR3yYomvapt
2020-10-30 00:50:20Zerologon(CVE-2020-1472)への注意喚起が再度なされていますね。8月にアップデートが公開されているものの、未だ攻撃が継続されているとのこと。 アップデートは必須の対策として、万一のときのためにAD操作ログの監視… https://t.co/1A4y6Lu7pT https://twitter.com/i/web/status/1321975662815576064ns_lsc
2020-10-30 00:30:21【日本のセキュリティチームのブログ】 Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/5MF0SIs2RJ http://dlvr.it/RkcX45azuminoICT
2020-10-30 00:10:05Make sure you #patch #netlogon vulnerability CVE-2020-1472! https://t.co/tTwsnIXX7D https://twitter.com/msftsecresponse/status/1321905885782941696CurtisHoughton4
2020-10-29 23:40:04Microsoft Warns of Continued Exploitation of CVE-2020-1472 - https://t.co/na7mvOaPYJ https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472moton
2020-10-29 23:30:12Zelologonとも呼ばれているNetlogonの脆弱性 (CVE-2020-1472)について今一度注意喚起しました(英語)ガイダンス内容は変わっていません。未対応の方はDCに8月以降のパッチの適用をお願いします https://t.co/EhCX44nNDh https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/EurekaBerry
2020-10-29 23:00:06Attackers are still exploiting the #Zerologon vulnerability (CVE-2020-1472). So please patch NOW! #netlogon… https://t.co/lFX47JmWM9 https://twitter.com/i/web/status/1321946167761162240RiskSense
2020-10-29 22:30:09How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/daIthtyGhH https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocvaldet_b
2020-10-29 22:20:14CVE-2020-1472 can be validated without privs (it's unauthenticated) RCE which gets you to SYSTEM on vulnerable doma… https://t.co/381JmbqJep https://twitter.com/i/web/status/1321939389866528770UK_Daniel_Card
2020-10-29 22:00:08Criminals are leveraging CVE-2020-1472 (ZeroLogon) to exploit domain controllers as part of ransomware campaigns! w… https://t.co/yGxAkrreT6 https://twitter.com/i/web/status/1321934819069173760Cv19Cyber
2020-10-29 21:50:28Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/GSUjZRS9PV https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ebellis
2020-10-29 21:40:21Attacks exploiting Netlogon vulnerability (CVE-2020-1472) - https://t.co/qvcSM9XaIz https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/ka0com
2020-10-29 21:40:16Microsoft Warns of Continued Exploitation of CVE-2020-1472 - https://t.co/eigntZH48B https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472ka0com
2020-10-29 21:40:11New forum topic: Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/xnjojxPSWT http://feedproxy.google.com/~r/GeekzoneForumsLatestPosts/~3/CK-mhLvmqzk/forums.aspgeekzonenzforum
2020-10-29 21:40:07Attackers are continuing to target the #Zerologon CVE-2020-1472 bug, so if your organization hasn't applied the pat… https://t.co/9JdlIzXkU5 https://twitter.com/i/web/status/1321929782783807491DecipherSec
2020-10-29 21:20:06@BiteFre4k gonna show how to check for CVE-2020-1472 using pingcastle!UK_Daniel_Card
2020-10-29 21:10:31...and if you think you’ve already patched every DCs for CVE-2020-1472, check again. Seeing customers where just on… https://t.co/JG5ItqsaJR https://twitter.com/i/web/status/1321920222220177412PetitoHead
2020-10-29 21:10:22Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/vTuWcsYff7 https://www.itsecuritynews.info/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/IT_securitynews
2020-10-29 20:50:07CERT Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/xnz22juO6T https://bit.ly/3mCDwUiPAUL_CSFI
2020-10-29 20:40:18Microsoft SRC | Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/oS4kYLdw9V https://bit.ly/3kJflmEStopMalvertisin
2020-10-29 20:40:16Attacks exploiting Netlogon vulnerability (CVE-2020-1472) Microsoft has received a small number of reports from cu… https://t.co/fYQfAmQoWm https://twitter.com/i/web/status/1321913232680955905Ben_P9T
2020-10-29 20:40:14> Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/NAHSVd2YY9 http://dlvr.it/Rkc2jbPaulomorgadoN
2020-10-29 20:40:12If you haven't applied security updates from Aug 2020 for CVE-2020-1472, please do. https://t.co/qhckHmwhMm Guidanc… https://t.co/NSoodvR5Nd http://aka.ms/CVE-2020-1472 https://twitter.com/i/web/status/1321913312112726016bsuneja
2020-10-29 20:30:20New post from https://t.co/9KYxtdZjkl (Attacks exploiting Netlogon vulnerability (CVE-2020-1472)) has been publishe… https://t.co/s52s80JIF8 http://www.sesin.at https://twitter.com/i/web/status/1321909684337561601www_sesin_at
2020-10-29 20:30:19New post from https://t.co/uXvPWJy6tj (Attacks exploiting Netlogon vulnerability (CVE-2020-1472)) has been publishe… https://t.co/aVG5tzKIYs http://www.sesin.at https://twitter.com/i/web/status/1321909685675565056WolfgangSesin
2020-10-29 20:30:10Microsoft Warns of Continued Exploitation of CVE-2020-1472https://us-cert.cisa.gov/ncas/current-activity/2020/10/29… https://t.co/rSB4Uj7RMv https://twitter.com/i/web/status/1321910634565554183gregoryfarley
2020-10-29 20:30:05Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/D4UwGMFuYy https://sl.advdat.com/3eaqz1mADVDAT_OH
2020-10-29 20:11:02Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/F3ZGa1uUok https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/microsoft-warns-continued-exploitation-cve-2020-1472?utm_source=dlvr.it&utm_medium=twitterRigneySec
2020-10-29 20:11:01ok gang! i know @ZephrFish has made some awesome content on CVE-2020-1472 but i think its time to get some more foc… https://t.co/WlfcaiL9wK https://twitter.com/i/web/status/1321905774214418433UK_Daniel_Card
2020-10-29 20:11:00Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/kry6ZWicm4 https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/?utm_source=dlvr.it&utm_medium=twitterRigneySec
2020-10-29 20:10:58#infosec Microsoft Warns of Continued Exploitation of CVE-2020-1472 https://t.co/Ctm9QWNno7 https://ift.tt/3jF1f4Bjeffreydbrown
2020-10-29 20:10:57[Recomendado]Attacks exploiting Netlogon vulnerability (CVE-2020-1472) https://t.co/95G7PwBfr1 #seguridadsi #ciberseguridad http://zpr.io/HFuhMseguridad_si
2020-10-29 16:30:20CVE-2020-1472 への対応は重要 #WindowsServerSummit Domain Controllerzhuky7
2020-10-29 13:43:33Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range #Splunk #Monitoring #DevOps #CloudAffaire https://t.co/FFznDZqPCI https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.htmlCloudAffaire
2020-10-28 08:21:22Zerologon CVE identifier: CVE-2020-1472 Affected products: Certain QNAP NAS https://t.co/wjrccHccXZ ------------ 【… https://t.co/yJ2WTSofCl https://www.qnap.com/zh-tw/security-advisory/qsa-20-07 https://twitter.com/i/web/status/1321363765053378560TWCERTCC
2020-10-28 06:40:05CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/mByYxf3uVq @YouTubeより https://youtu.be/1h_wlMWwyB4hydra_frag
2020-10-27 15:00:02Découvrez notre dernier article : La vulnérabilité Zerologon CVE-2020-1472 menace les contrôleurs de domaine… https://t.co/4SSSnywgCZ https://twitter.com/i/web/status/1321103908891222016ATuncert
2020-10-27 13:50:05Sentinelone warnt vor kritischer Schwachstelle Zerologon CVE-2020-1472, besser bekannt als #Zerologon, ist eine kr… https://t.co/XR9i6nKiCr https://twitter.com/i/web/status/1321084382376087562netzpalaver
2020-10-27 11:10:03If you need another reason to make sure your domain controllers are patched for the Zerologon (CVE-2020-1472) vulne… https://t.co/lsH1o7St22 https://twitter.com/i/web/status/1321044313615335425breachbits
2020-10-27 05:50:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/D7Vp1GWW3G https://twitter.com/i/web/status/1320963983579512832916MARINE
2020-10-27 00:50:02CVE-2020-1472 - Vulnerabilidad de elevación de privilegios de Netlogon en Windows Server 2019/2016 https://t.co/IZTL6BjGuw https://youtu.be/WMWo_yNsS1AJGAITPro
2020-10-26 18:30:06CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-26 18:20:02Zerologonの脆弱性は、WindowsでActive Directoryのユーザー認証に使われる「Netlogonリモートプロトコル」に存在する(CVE-2020-1472)。悪用された場合、認証を受けていない攻撃者がドメイ… https://t.co/jVDVTMru8C https://twitter.com/i/web/status/1320790144647979008KazekitaruT
2020-10-26 13:00:03Zerologon (CVE-2020-1472) 「ドメインコントローラーにパッチ適用を」 https://t.co/QpA8XBnMOt #Qiita https://qiita.com/kodamap/items/436f7bc84a66b6267feek_oi
2020-10-26 11:00:02Zerologonについては米国土安全保障省のセキュリティ機関CISAも9月の時点で全連邦省庁に対して異例の緊急指令を出し、CVE-2020-1472の更新プログラムを直ちに適用するよう指示していた。 ランサムウェアが見せつけた… https://t.co/hzEec1oKaG https://twitter.com/i/web/status/1320680437954478081kai_ri_0001
2020-10-26 06:10:03New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/Auvs4tNACh https://lnkd.in/ecxvfgfJemandi
2020-10-26 05:10:04Zerologon vulnerability [CVE-2020-1472] allows attackers to take over domain controllers without triggering any ala… https://t.co/TxTWsb9BL7 https://twitter.com/i/web/status/1320591243722825729AkremBasha
2020-10-26 05:00:02Zerologon vulnerability [CVE-2020-1472] allows attackers to take over Domain Controller without triggering any alar… https://t.co/eNThGpvuUv https://twitter.com/i/web/status/1320590978491781120AkremBasha
2020-10-25 18:30:05CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-25 13:30:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/C3o1yjzsFZ https://twitter.com/i/web/status/1320354964368130048riddell_lindsay
2020-10-24 17:50:03Zerologon (CVE-2020-1472)、結局のところ1/256でChallenge–response authのvalueが0で埋まっていたということと理解したが、それに何年もの間だれも気づかなかったのか、という疑問が残った。juntani
2020-10-24 16:20:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/rUa96QL6wu https://twitter.com/i/web/status/1320035785748467714ITNEXT_USA
2020-10-24 13:40:04hala yamamadık mı ? #CVE-2020-1472 https://t.co/pkSg7wsqep https://lnkd.in/dUNBAzWmelihozhan
2020-10-24 10:20:03CVE-2020-1472 угрожает контроллеру домена https://t.co/iKSz10ojXQ https://t.co/2WUtxolI0C https://bit.ly/3m4wckafree_safety_ru
2020-10-23 18:50:05Terse note by French IT outsource firm isn't helpful. If #zerologon (CVE-2020-1472) was involved, the patch was rel… https://t.co/GGIzc1EKJN https://twitter.com/i/web/status/1319711459064958978kurmac
2020-10-23 18:30:07CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-23 17:10:07#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/dyhEqp0C6Q https://twitter.com/i/web/status/1319685061936091136arielMIS
2020-10-23 15:20:02#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/uzEPMXDVqe https://twitter.com/i/web/status/1319659246225641475CharlesJBooth
2020-10-23 14:10:11#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/gIB5wTIiG1 https://twitter.com/i/web/status/1319639938393165826Fortinet26
2020-10-23 12:50:03QNAP warns of Windows Zerologon flaw affecting some NAS devices CVE-2020-1472 #Security https://t.co/qOi87CUclf https://t.co/fD6SvrZHYz https://www.qnap.com/en-us/security-advisory/QSA-20-07 https://www.bleepingcomputer.com/news/security/qnap-warns-of-windows-zerologon-flaw-affecting-some-nas-devices/yipcw
2020-10-23 06:40:02CVE-2020-1472 - Vulnerabilidad de elevación de privilegios de Netlogon e... https://t.co/KfwavMT162 a través de @JGAITPro https://youtu.be/WMWo_yNsS1Aapuntesjulio
2020-10-23 01:50:03CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability https://t.co/ZlRUmMvRc6 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472kosik2061
2020-10-23 01:40:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/T3BeA7NSVQ https://twitter.com/i/web/status/1319451546854240258hutton647
2020-10-23 01:30:02#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/aJXoWdnDTM https://twitter.com/i/web/status/1319450586367037440EBSolutionCA
2020-10-23 01:00:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/IIWiuxPSDm https://twitter.com/i/web/status/1319441691510755328khronostelecom
2020-10-23 01:00:02QNAP advierte de que la #vulnerabilidad crítica Zerologon (CVE-2020-1472) de Windows afecta a algunos de sus dispos… https://t.co/lojEWiDTC2 https://twitter.com/i/web/status/1319442535882870790NormanOre
2020-10-23 00:40:14#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/dH3AVgTFJS https://twitter.com/i/web/status/1319435936644714497hytekcomputers
2020-10-23 00:40:11#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/kCP5s0DW56 https://twitter.com/i/web/status/1319436770736570368star_privacy
2020-10-23 00:40:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/yy4bBOO1JU https://twitter.com/i/web/status/1319437716631789571jesuscajero
2020-10-23 00:30:06#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/KEgm8t90H4 https://twitter.com/i/web/status/1319433746370658304Edge_worx
2020-10-23 00:30:05#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/LWQHqsuNyg https://twitter.com/i/web/status/1319434878371434497CanteraIT
2020-10-23 00:20:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/RrrNyaYZHj https://twitter.com/i/web/status/1319431851774267397squaremoat
2020-10-23 00:10:08#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/CHVP4QHNld https://twitter.com/i/web/status/1319428866394521600SydowIS
2020-10-23 00:00:09#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/z2vmFKIlKe https://twitter.com/i/web/status/1319427121626992640NorcomSolutions
2020-10-22 23:40:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/1BJ7DTQ3Pm https://twitter.com/i/web/status/13194230487311974411Opsec2
2020-10-22 23:30:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/1Rb55DVIGz https://twitter.com/i/web/status/1319420122830950403repdym
2020-10-22 23:30:02#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/L98pnfSfee https://twitter.com/i/web/status/1319420542873706496stigroup
2020-10-22 23:20:05#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/OjPrGRHTuG https://twitter.com/i/web/status/1319416002992455681smbgurus
2020-10-22 23:20:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/TqgBESKEz4 https://twitter.com/i/web/status/1319417515634790400em2it
2020-10-22 23:10:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/wqmUNZhhZF https://twitter.com/i/web/status/1319415246063341568amsinetworks
2020-10-22 23:10:02#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/a1MsJ1f6WJ https://twitter.com/i/web/status/1319415582069051398DoOver2019
2020-10-22 23:00:11#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/VnuO8zWIJc https://twitter.com/i/web/status/1319411795317108736CyberSecManaged
2020-10-22 22:50:10#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/eFzJqgtdzC https://twitter.com/i/web/status/1319408578546065409barryfein
2020-10-22 22:50:09#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/14kIYTtKSz https://twitter.com/i/web/status/1319408956608028673SecureERP
2020-10-22 22:50:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/ERAzo3iBdU https://twitter.com/i/web/status/1319410472811200512smbgurus
2020-10-22 22:40:16#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/sB8VLzHDrT https://twitter.com/i/web/status/1319406691524530177carloyolax
2020-10-22 22:30:07#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/BaW5ChueLX https://twitter.com/i/web/status/1319403281492357122SecurityVal
2020-10-22 22:30:06#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/oOC4zNw6Ew https://twitter.com/i/web/status/1319403472836583429WilskeRobert
2020-10-22 22:30:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/QkFKfXZYQF https://twitter.com/i/web/status/1319404458464378881o_integradas
2020-10-22 22:10:13#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/V15OnlmTnf https://twitter.com/i/web/status/1319398228689813505amsinetworks
2020-10-22 22:10:05#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/2q63SAOshL https://twitter.com/i/web/status/1319399653713022982ThePlugGroupInc
2020-10-22 22:10:05#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/MqANlTLbnm https://twitter.com/i/web/status/1319399650227605505trinitynetworx
2020-10-22 22:10:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/snD5ZoMy1n https://twitter.com/i/web/status/1319399657311784961fuselogix
2020-10-22 22:00:06#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/XuflMKPq92 https://twitter.com/i/web/status/1319395900351868928gatanasio_71
2020-10-22 21:40:09#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/wq1Ca7w4vC https://twitter.com/i/web/status/1319390923671916544richdonegan
2020-10-22 21:20:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/xD5yp0evWi https://twitter.com/i/web/status/1319385633018826752MarcioLoboM1
2020-10-22 21:20:02#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/NaMBLBXCLh https://twitter.com/i/web/status/1319387499316248580integotec
2020-10-22 19:30:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/hlgPFSZjEA https://twitter.com/i/web/status/1319358622896431105JodyPopplewell
2020-10-22 19:11:19#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/fzvXW1I1rv https://twitter.com/i/web/status/1319352888100007936TechproGlobalGH
2020-10-22 18:40:03CVE-2020-1472,a.k.a.Zerologon exploitation.This tool exploits a cryptographic vulnerability in Netlogon to achieve… https://t.co/z0LvGEZL4m https://twitter.com/i/web/status/1319346948206399488HANIALSULAMIx
2020-10-22 18:30:05#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/y5EdiDbDbV https://twitter.com/i/web/status/1319344035874721792LtdNamaste
2020-10-22 18:30:05CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-22 18:20:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/4i2LNew3qo https://twitter.com/i/web/status/1319340255888216066Edp4u
2020-10-22 18:20:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/vTkrtiF575 https://twitter.com/i/web/status/1319341008811937795fintech_group
2020-10-22 18:20:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/W6nn8DKMvX https://twitter.com/i/web/status/1319340588274229248MBITJapan
2020-10-22 18:10:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/9dVaLQqGtw https://twitter.com/i/web/status/1319339076328300545CarerraHoldings
2020-10-22 18:10:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/MlPkAfNxqt https://twitter.com/i/web/status/1319338739911561221INStream10
2020-10-22 18:00:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/6FANHUuJzu https://twitter.com/i/web/status/1319337225075777537FrikEnTwit
2020-10-22 17:40:09#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/mSduJjY2GB https://twitter.com/i/web/status/1319330201592078340thiennh7
2020-10-22 17:40:08#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/81ZTeudrHb https://twitter.com/i/web/status/1319331299417620481flow_networks
2020-10-22 17:40:02#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/DQ04LL6s2k https://twitter.com/i/web/status/1319332249578373122dr_know_yordi
2020-10-22 17:30:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/GVWTejiI0E https://twitter.com/i/web/status/1319329210142543873Trust3Security
2020-10-22 17:30:02#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/KHhHSrgy9P https://twitter.com/i/web/status/1319329441840091137techsenses_
2020-10-22 17:10:12#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/ZjiaIRDQNG https://twitter.com/i/web/status/1319323156054683648DanWalk39801347
2020-10-22 16:10:06CVE-2020-1472 (Zerologon) Exploit Detection Cheat Sheet https://t.co/O5F5bXaFL1 https://www.kroll.com/en/insights/publications/cyber/cve-2020-1472-zerologon-exploit-detection-cheat-sheetn0ipr0cs
2020-10-22 16:10:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/lMViqNn5xh https://twitter.com/i/web/status/1319309550550470658agrisols
2020-10-22 16:00:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/SMbcHe9n93 https://twitter.com/i/web/status/1319306522237743105shanil_daya
2020-10-22 16:00:02#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/P132eE7Vqj https://twitter.com/i/web/status/1319307278852493313veracompsofia
2020-10-22 15:50:07#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/JTVgUYvh7R https://twitter.com/i/web/status/1319302508335013889AVFZC
2020-10-22 15:40:05#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/zbZ3ET7JYw https://twitter.com/i/web/status/1319301377659645954IRIS_Technology
2020-10-22 15:40:04#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/IoCzQNnRJh https://twitter.com/i/web/status/1319302128838594562info_vibes
2020-10-22 15:40:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/j2I3fPd2gd https://twitter.com/i/web/status/1319302132483358720TechnologiesZm
2020-10-22 15:40:02#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/DsdHRgMWoX https://twitter.com/i/web/status/1319302495483691010ShahsiRathnayak
2020-10-22 15:30:03#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/NcrMGmoif5 https://twitter.com/i/web/status/1319299577107927046MicheleCiacci
2020-10-22 14:20:02Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472) https://t.co/cNxpv51tkD https://fortiguard.com/threat-signal-report/3711/ryuk-threat-actors-incorporating-windows-zerologon-vulnerability-cve-2020-1472RMJConsulting
2020-10-22 09:50:03❗️QNAP advierte de que la #vulnerabilidad crítica Zerologon (CVE-2020-1472) de Windows afecta a algunos de sus disp… https://t.co/1PioTr5OfZ https://twitter.com/i/web/status/1319213109354110976matarturo
2020-10-22 06:10:27#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/US8Bvpbchr https://twitter.com/i/web/status/1319158467744223234security_hunter
2020-10-21 23:40:15#FortiGuardLabs Threat Signal Report: Ryuk Threat Actors Exploiting Windows Zerologon Vulnerability (CVE-2020-1472)… https://t.co/ujti55YAzg https://twitter.com/i/web/status/1319060150066532352FortiGuardLabs
2020-10-21 18:30:40CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-21 12:10:04Zerologon (CVE-2020-1472): Find and Remediate in Real Time with Tanium Learn more about this vulnerability, the ris… https://t.co/MY7xycdp96 https://twitter.com/i/web/status/1318885462895939584MLubbat
2020-10-21 10:10:26New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/zRQ4QOREsl https://lnkd.in/dqqkXV7monaarishi
2020-10-21 10:10:16AD: ---- CVE-2020-1472: #ZeroLogon by @SecuraBV CVE-2019-1040: NTLM relay bypass (@simakov_marina & @YaronZi) MDM… https://t.co/ygWjHE3V4c https://twitter.com/i/web/status/1318854954262683649SagieSec
2020-10-21 08:00:31緊急です!みたいなノリで、CVE-2020-1472の注意喚起メールが流れてきた。。。いやあれ一ヶ月前にニュースになってたやつですよね・・・iqm
2020-10-21 07:40:20Security Advisory: Critical Zerologon Vulnerability (CVE-2020-1472) Redscan https://t.co/l7T3lePUv6 https://t.co/julpOqY8JN http://upflow.co/l/N7OaMokoti_Inc
2020-10-21 06:10:04Network Detection for ZeroLogon (CVE-2020-1472) https://t.co/p79gWa1Wli https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/network-detection-for-zerologon-cve-2020-1472/reverseame
2020-10-20 18:30:23CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-20 18:10:38A new #attackerkb assesment on 'CVE-2020-1472 aka Zerologon' has been created by gwillcox-r7. Attacker Value: 0 | E… https://t.co/1Bi6dHK0JO https://twitter.com/i/web/status/1318613169229697026Attackerkb_Bot
2020-10-20 13:50:03Windows Server 2008 R2以降に適用すべきパッチへのリンク先は、このページにまとまっています。 https://t.co/JEGpE3vBgF CVE-2020-1472 | Netlogon の特権の昇格の脆… https://t.co/qsiQHldqpD https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2020-1472 https://twitter.com/i/web/status/1318548525660180480norimaki2000
2020-10-20 11:40:12Great news. Microsoft Defender for Identity can now detect #zerologon (CVE-2020-1472). #m365 #microsoft365… https://t.co/Q0U74VGINm https://twitter.com/i/web/status/1318515315148509184zimmergren
2020-10-20 11:00:12Ryuk in 5 h @TheDFIRReport @SwitHak ➡️Zerologon (CVE-2020-1472) exploited 2 hours after initial execution of Bazar… https://t.co/AhqgwcXlkv https://twitter.com/i/web/status/1318505657067315200argevise
2020-10-19 20:30:37Researcher @GossiTheDog reports more attackers exploiting his Zerologon (CVE-2020-1472) honeypot… https://t.co/CWBcHx2mZ1 https://twitter.com/i/web/status/1318285800627384321virusbtn
2020-10-19 18:30:30CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-19 13:10:122020/10/09 Alert (AA20-283A) 公開 https://t.co/iMjtgfpBQG 「CVE-2020-1472 に加えて ... APT攻撃者を観察しました。」 https://us-cert.cisa.gov/ncas/alerts/aa20-283akikou_mewan
2020-10-19 13:00:052020/08/17 CVE-2020-1472 公開 https://t.co/DUiwdXl5et https://nvd.nist.gov/vuln/detail/CVE-2020-1472kikou_mewan
2020-10-19 13:00:042020/09/23 PSA公示 https://t.co/9o7kt5XVHu 「FBIとCISAは、これまでのところ、米国人の投票を妨げたり、2020年の選挙の投票数を変更したりするような脅威は確認していません。」 (※すでにCVE-2020-1472は既知) https://www.cisa.gov/sites/default/files/publications/PSA_CyberThreats_Final-508.pdfkikou_mewan
2020-10-19 12:00:05New post: | CVE-2020-1472:NetLogon特权提升漏洞分析 https://t.co/U4KrIHH3UQ:netlogon特权提升漏洞分析/ https://reportcybercrime.com/cve-2020-1472digitpol_cyber
2020-10-19 11:20:03Ryuk #Ransomware in 5 Hours(!) Zerologon (CVE-2020-1472) #PatchNow https://t.co/I5q6Hdf9v6 https://twitter.com/TheDFIRReport/status/1317976355271856133HonkHase
2020-10-19 10:30:03QNAP ha lanzado una nueva actualización de seguridad (CVE-2020-1472) para prevenir que los NAS configurados como co… https://t.co/XVGW52DN23 https://twitter.com/i/web/status/1318136648631226368cyberseguridad
2020-10-19 10:10:10#RYUK in five hours. CVE-2020-1472. Just keeping the internet safe. https://t.co/VKuwWPakgN https://twitter.com/thedfirreport/status/1317976355271856133anthomsec
2020-10-19 09:50:02Au menu : 👉 Phishing email 👉 Contrôle du DC en moins de 2 heures via zerologon (CVE-2020-1472) 👉 Cobalt Strike, AdF… https://t.co/5m5vGR94XE https://twitter.com/i/web/status/1318126774098808832AElmehdi
2020-10-19 07:30:04From phishing email to domain wide Ryuk ransomware in 5 hours. Privilege escalation using Zerologon (CVE-2020-1472)… https://t.co/kA3XtkgifI https://twitter.com/i/web/status/1318091284981178368stefant
2020-10-19 01:40:04A different way of abusing Zerologon (CVE-2020-1472) https://t.co/y5Q2XFJWkp https://t.co/h6pvOlPrc2 https://www.reddit.com/r/netsec/comments/iz6vvd/a_different_way_of_abusing_zerologon_cve20201472/?utm_source=dlvr.it&utm_medium=twittertechadversary
2020-10-19 00:00:05Ryuk in 5 Hours ➡️Zerologon (CVE-2020-1472) exploited 2 hours after initial execution of Bazar ➡️Cobalt Strike & B… https://t.co/OlrFpnZW2b https://twitter.com/i/web/status/1317976355271856133TheDFIRReport
2020-10-17 06:50:30So if you haven't patched, bad actors can SERIOUSLY mess with your domain controllers. Patch CVE-2020-1472. All t… https://t.co/4QZyC3VDn5 https://twitter.com/i/web/status/1317354969868115968aprilmardock
2020-10-17 02:28:04Zero Logon - I have just completed this room! Check it out: https://t.co/k3M2y7eI7b #tryhackme #CVE-2020-1472… https://t.co/ckEnPledXT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316900622642388995isaacmichaan1
2020-10-17 01:48:19Zero Logon - I have just completed this room! Check it out: https://t.co/k3M2y7eI7b #tryhackme #CVE-2020-1472… https://t.co/ckEnPledXT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316900622642388995isaacmichaan1
2020-10-17 01:18:58Zero Logon - I have just completed this room! Check it out: https://t.co/k3M2y7eI7b #tryhackme #CVE-2020-1472… https://t.co/ckEnPledXT https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316900622642388995isaacmichaan1
2020-10-16 18:30:26CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-16 12:31:26Zero Logon - Naughty little exploit!! Check it out: https://t.co/nmNrXji9Xs #tryhackme #CVE-2020-1472 #Active Dire… https://t.co/MXQNd7eDPF https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1317077855336075265DonnieMarcoFoto
2020-10-16 08:40:09در رابطه با CVE-2020-1472 شاید به درد شما بخورد. https://t.co/6iyYkKWs21 https://twitter.com/ArashNaderpour/status/1317005622387240966Sadegh65
2020-10-15 18:30:21CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-15 16:25:15Zero Logon - I have just completed this room! Check it out: https://t.co/N11FuVIqip #tryhackme #CVE-2020-1472… https://t.co/edt30hHkty https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316481404767789061MikeHanchos
2020-10-15 16:06:09Zero Logon - I have just completed this room! Check it out: https://t.co/N11FuVIqip #tryhackme #CVE-2020-1472… https://t.co/edt30hHkty https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316481404767789061MikeHanchos
2020-10-15 15:45:41Zero Logon - I have just completed this room! Check it out: https://t.co/N11FuVIqip #tryhackme #CVE-2020-1472… https://t.co/edt30hHkty https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316481404767789061MikeHanchos
2020-10-15 11:30:21برای شناسایی آسیب‌پذیری #Zerologon یا CVE-2020-1472 در سرورهای ویندوزی،‌ این Event-ID ها رو مانیتور کنید: ٍEvent-I… https://t.co/P8YnDCjweI https://twitter.com/i/web/status/1316702600692150273M_Shahpasandi
2020-10-15 09:50:34Exploiting #ZeroLogont CVE-2020-1472 (Part I - Reset) DC Domain Admin Password Reset!!! https://t.co/bpeyEpvIbb https://www.youtube.com/watch?v=3xEk6ZaBMJ8&feature=youtu.beAnastasis_King
2020-10-15 09:20:12اگر کسی اینجا بتونه برای zerologon که متعلق به CVE-2020-1472 یه رول ست Snort بنویسه، کمک بزرگی به بیمارستان‌های کشو… https://t.co/DPGGIEVsIh https://twitter.com/i/web/status/1316669425748246530aliereza
2020-10-15 08:40:32CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/flOXDXWIza https://twitter.com/i/web/status/1316658874582065152AlicePintori
2020-10-15 03:40:15CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/aT9LXzqK5y https://twitter.com/i/web/status/1316583386610163712Patent_4405829
2020-10-14 20:17:08Zero Logon - I have just completed this room! Check it out: https://t.co/HiFHxiKqg4 #tryhackme #CVE-2020-1472… https://t.co/k6AFNX84F5 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1316465886228811776wearyandroid
2020-10-14 18:30:37CVE-2020-1472 https://t.co/BmC2HtUEmi #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-14 17:20:26New post: Zerologon: Windows Netlogon Vulnerability CVE-2020-1472 https://t.co/LrGkgiVcdL https://reportcybercrime.com/zerologon-windows-netlogon-vulnerability-cve-2020-1472/digitpol_cyber
2020-10-14 16:20:40Zerologon: Windows Netlogon Vulnerability CVE-2020-1472 https://t.co/hAXaXwqOUJ https://www.itsecuritynews.info/zerologon-windows-netlogon-vulnerability-cve-2020-1472/IT_securitynews
2020-10-14 14:40:32تو این #وبینار، «مهدی حاتمی» درباره‌ی آسیب‌پذیری CVE-2020-1472 موسوم به #Zerologon و روش‌های کاربردی رو برای شناسا… https://t.co/9XmIFTY5Oo https://twitter.com/i/web/status/1316386248643272708RavinAcademy
2020-10-14 13:00:42اطلاعیه‌های مذکور مربوط به ارتقای مجوز دسترسی (elevation of privilege) با شناسه CVE-2020-1472 در Netlogon مایکروساف… https://t.co/XKkC34ZvfP https://twitter.com/i/web/status/1316361169372880903TheZoomit
2020-10-14 11:00:19اعلان آسیب پذیری کد :CVE-2020-1472 سطح :critical رتبه :10.0 تاریخ انتشار :2020-08-17 تاریخ بروزرسانی :2020-10-… https://t.co/cm5Fz0jMUM https://twitter.com/i/web/status/1316331879331700736AlirezaGhahrood
2020-10-14 10:14:14CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/FiOlmmt6Ac https://twitter.com/i/web/status/1316319674750050304Michal_Jarski
2020-10-14 09:41:30تیم شکار تهدیدات سایبری «آکادمی راوین» در تاریخ دوم مهر، در وبیناری آسیب‌پذیری CVE-2020-1472 را تحلیل و نسبت به مخا… https://t.co/XtT9TrXHOc https://twitter.com/i/web/status/1316311338654871552RavinAcademy
2020-10-14 09:40:49به زودی وبیناری با هدف بررسی روش‌های شناسایی و مقابله با حملات مبتنی بر آسیب‌پذیری CVE-2020-1472 با استفاده از تحلیل ترافیک ارایه خواهد شد.RavinAcademy
2020-10-14 06:12:04id::1316252476627189760:RT @netsecu: https://t.co/cuXzFR3FoT CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chainAnd_Or_R
2020-10-13 21:50:25How do you battle against CVE-2020-1472 aka #Zerologon, the #exploit that allows an #attacker to compromise an unpa… https://t.co/DXxRq0yHhQ https://twitter.com/i/web/status/1316131997526437893FoluwaRewane
2020-10-13 21:40:08Iran says it was hit by another CyberAttack. Some researchers believe that the attackers used CVE-2020-1472 exploit… https://t.co/riTsH6uGAh https://twitter.com/i/web/status/1316131172284592131NarimanGharib
2020-10-13 20:10:10Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range https://t.co/LpnRiQkM9k https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.htmlopexxx
2020-10-13 18:30:13CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-13 18:20:04#APT Gruppen nutzen CVE-2018-13379 (#Fortigate SSL-VPN) in Kombination mit CVE-2020-1472 (#Netlogon) aus, um Netzwe… https://t.co/jsVOFcGpk3 https://twitter.com/i/web/status/1316080958014185472certbund
2020-10-13 13:50:04CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/1DO1rrib7K https://twitter.com/i/web/status/1316011930029416448Art_Capella
2020-10-13 13:30:03CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/ulmN7DU9iX https://twitter.com/i/web/status/1316007149206605824nahidupa
2020-10-13 12:30:04Microsoft is warning that CVE-2020-1472, a high-impact vulnerability that allows hackers to instantly take control… https://t.co/FqAVeuOpZG https://twitter.com/i/web/status/1315990987131494401sobca
2020-10-13 12:20:03CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/oZ7TGeTrqd https://twitter.com/i/web/status/1315989397544734722BullStallcup
2020-10-13 12:10:05CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/AHQINBbUdW https://twitter.com/i/web/status/1315986029145288704Lori_Riot
2020-10-13 12:00:05「FreeBuf发自 https://t.co/feGSstpIpS」【黑客利用VPN漏洞入侵美国政府选举支持系统】黑客通过结合VPN漏洞与最近的Windows CVE-2020-1472安全漏洞,入侵了美国选举支持系统,并获得了… https://t.co/KYcpfGjfg0 https://weibo.com/2028255444/JoZk53vFK https://twitter.com/i/web/status/1315983948212625413CNDevDaily
2020-10-13 11:30:03Microsoft has observed new threat activity exploiting the critical #Zerologon #vulnerability (CVE-2020-1472) https://t.co/QPfVxYU1Is http://ow.ly/K7cX30reDf1ncxgroup
2020-10-13 08:40:06[WARNING] A huge activity of CVE-2020-1472 #Zerologon exploitation activity is identified by @MsftSecIntel . It is… https://t.co/PX1pA4y3su https://twitter.com/i/web/status/1315933882559221762vFeed_IO
2020-10-13 08:40:05CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/Rf9pbLR6jc https://twitter.com/i/web/status/1315934133877575681Michal_Jarski
2020-10-13 08:40:05[WARNING] A huge activity of CVE-2020-1472 #Zerologon exploitation activity is identified by @MsftSecIntel . It is… https://t.co/mboUdwFChb https://twitter.com/i/web/status/1315933987785912320ToolsWatch
2020-10-13 08:10:06id::1315910145029763073:id::1315895046160347137:id::1315891237203869699:RT @netsecu: https://t.co/cuXzFR3FoT CVE-2020-1472: Advanced Persist https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chainAnd_Or_R
2020-10-13 07:10:05id::1315895046160347137:id::1315891237203869699:RT @netsecu: https://t.co/cuXzFR3FoT CVE-2020-1472: Advanced Persistent Threat Actors Use Ze https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chainAnd_Or_R
2020-10-13 06:20:03かなり遅れ気味だけど、Zerologon(CVE-2020-1472)についてお勉強。 なかでも、IT系魔女VTuber kurenaifによる解説動画がわかりやすかった。 とくに8分11秒からの「AES-cfb8をPythonで… https://t.co/H8UvErvjwT https://twitter.com/i/web/status/1315899718820483072v_avenger
2020-10-13 06:10:05id::1315891237203869699:RT @netsecu: https://t.co/cuXzFR3FoT CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chainAnd_Or_R
2020-10-13 05:20:04https://t.co/xN16fX3bJ4 CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Cha… https://t.co/gxS3NFPdla https://www.tenable.com/blog/cve-2020-1472-advanced-persistent-threat-actors-use-zerologon-vulnerability-in-exploit-chain https://twitter.com/i/web/status/1315882490582704130netsecu
2020-10-13 05:20:03黑客利用VPN漏洞入侵美国政府选举支持系统 https://t.co/3BNdYg6fc7 黑客通过结合VPN漏洞与最近的Windows CVE-2020-1472安全漏洞,入侵了美国选举支持系统,并获得了访问权限。 https://www.freebuf.com/articles/251865.htmlM157q_News_RSS
2020-10-13 05:10:04ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/Ac05O1xFKE https://piyolog.hatenadiary.jp/entry/2020/09/28/124522giw_news
2020-10-13 01:00:03CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/UumdjQixuU https://twitter.com/i/web/status/1315817143364128768ka0com
2020-10-12 22:50:04CVE-2020-1472, mejor conocido como #Zerologon, es una nueva vulnerabilidad crítica en el Protocolo Remoto de Netlog… https://t.co/92M0u4kJe6 https://twitter.com/i/web/status/1315785295569317888TrendMicroLATAM
2020-10-12 22:30:03CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulner… https://t.co/8tAGWyWvuE https://twitter.com/i/web/status/1315779849831829504_GrimSqueaker_
2020-10-12 19:30:04Al encadenar las vulnerabilidades de VPN y la reciente falla de seguridad de Windows CVE-2020-1472. La Agencia de S… https://t.co/S7zhxUePZC https://twitter.com/i/web/status/1315734127581319168CyberSecCorp
2020-10-12 19:30:03@0xGUH CVE-2020-1472 (CRITICAL severity 10/10) with 36 PoC exploits available https://t.co/C6XrxQuOJq 🤖 https://www.cvebase.com/cve/2020/1472cvebase
2020-10-12 19:30:03Finally got a chance to experiment with CVE-2020-1472 (Zerologon) earlier tonight. Ran the exploit, used the Impac… https://t.co/kUZqsToZbP https://twitter.com/i/web/status/1315734760040411136d4rkshell
2020-10-12 19:30:02@0xGUH CVE-2020-1472 (CRITICAL severity 10/10) with 36 PoC exploits available https://t.co/C6XrxQuOJq 🤖 https://www.cvebase.com/cve/2020/1472cvebase
2020-10-12 18:30:05CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-12 18:10:05@QNAP_nas are you going do do something about zerologon (CVE-2020-1472)? This is a very critical security issue, an… https://t.co/0B7IILNCXS https://twitter.com/i/web/status/1315714881144983553FuNKeY86165935
2020-10-12 12:50:03Microsoft reports that ransomware gangs like TA505 are now exploiting the ZeroLogon (CVE-2020-1472) vulnerability i… https://t.co/JdvGkq5lzH https://twitter.com/i/web/status/1315633576650604546virusbtn
2020-10-12 07:40:05Russian #Cybercrime group is exploiting #Zerologon #flaw, #Microsoft warns https://t.co/vZw5Kqdasw #CVE-2020-1472… https://t.co/ExsHsw5VhP https://securityaffairs.co/wordpress/109323/hacking/ta505-zerologon-attacks.html?utm_source=feedly&utm_medium=rss&utm_campaign=ta505-zerologon-attacks https://twitter.com/i/web/status/1315556365469986817tribal_sec
2020-10-12 02:10:04@TheDFIRReport CVE-2020-1472 (CRITICAL severity 10/10) with 36 PoC exploits available https://t.co/C6XrxQuOJq 🤖 https://www.cvebase.com/cve/2020/1472cvebase
2020-10-11 22:20:03🚨The Ryuk threat actors are actively exploiting ZeroLogon (CVE-2020-1472).🚨 Report coming soon. If you're looking… https://t.co/bDxF44gB2a https://twitter.com/i/web/status/1315416442758746121TheDFIRReport
2020-10-11 18:30:03CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-11 15:20:02I have just completed this room! Check it out: https://t.co/KOMqLXTnj9 #tryhackme #CVE-2020-1472 #Active Directory… https://t.co/y3btw01a6J https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1315310862912151552m_siarhei
2020-10-11 14:50:03ویدیوی #وبینار «بررسی و تحلیل آسیب‌پذیری CVE-2020-1472 موسوم به Zerologon» منتشر شد. این ویدیو رو می‌تونید در لینک… https://t.co/nh01IrMwqM https://twitter.com/i/web/status/1315303436108345344RavinAcademy
2020-10-11 11:50:02#Bedrohungsmanagement mit Stormshield am Beispiel der Microsoft #Schwachstelle #Zerologon (CVE-2020-1472): unsere E… https://t.co/FfW7t29m2t https://twitter.com/i/web/status/1315257634690420736Stormshield_GER
2020-10-11 11:20:03Best write up I’ve seen about CVE-2020-1472. A must read. https://t.co/revPFgLAA7 https://twitter.com/aaronmargosis/status/1314258652396687360T0P_Cyber
2020-10-11 10:40:04Zero Logon - I have just completed this room! Check it out: https://t.co/IImZILoasf #tryhackme #CVE-2020-1472 via @realtryhackme DCなんも分からん… https://tryhackme.com/room/zer0logonpzt
2020-10-11 07:40:03Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/YDrXb8RKAv https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.htmlreverseame
2020-10-10 18:30:06CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-10 12:40:02ZeroLogon explanation (CVE-2020-1472) [Arabic] https://t.co/ukGchYu02G by @KaremAliFaisal https://youtu.be/eVgEW7WhSnwa_elmayyah
2020-10-10 06:00:02Zero Logon - I have just completed this room! Check it out: https://t.co/M3Rr0Ecd2o #tryhackme #CVE-2020-1472… https://t.co/tgrHw7jQW1 https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1314805747516022784nomizooone
2020-10-09 20:10:03Zerologon (CVE-2020-1472) is more complicated than a lot of people realize. Tanium's Aaron Margosis explains why it… https://t.co/hbClU3OQY1 https://twitter.com/i/web/status/1314656963448504321Tanium
2020-10-09 20:10:02Zerologon (CVE-2020-1472) is more complicated than a lot of people realize. Tanium's Aaron Margosis explains why it… https://t.co/Z5Jrj4JJoZ https://twitter.com/i/web/status/1314658036741484544smullis
2020-10-09 20:10:02Zerologon (CVE-2020-1472) is more complicated than a lot of people realize. Tanium's Aaron Margosis explains why it… https://t.co/m25pgTUfcH https://twitter.com/i/web/status/1314657505314779137imPOSHster
2020-10-09 18:30:07CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-09 18:20:02CVE-2020-1472: El exploit Netlogon que brinda control completo de su sistema Windows a los hackers fácilmente. Parc… https://t.co/bD7mOuBSqy https://twitter.com/i/web/status/1314630960474972161sitranscuba
2020-10-09 17:10:06A new #attackerkb assesment on 'CVE-2020-1472 aka Zerologon' has been created by zeroSteiner. Attacker Value: 5 | E… https://t.co/wys2CaS6dG https://twitter.com/i/web/status/1314612832395239429Attackerkb_Bot
2020-10-09 16:10:07A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/a0n9rsI5e3 https://twitter.com/i/web/status/1314596634035138560Kasperskybrasil
2020-10-09 16:00:04New Zerologon Attack Variants (CVE-2020-1472) Exploitation and Detection Distilled -- https://t.co/Pxo6o5hftI https://www.securonix.com/from-zero-to-dc-new-zerologon-attack-variants-cve-2020-1472-exploitation-and-detection-distilled/AndreGironda
2020-10-09 15:50:03Microsoft Zerologon CVE-2020-1472, DoppelPaymer Ransomware, IoT Security https://t.co/6NLN1Jjkw9 https://t.co/yxJ1bQzSXb https://bit.ly/3dbioBomike2003sims
2020-10-09 15:10:03@microsoft reporto en el mes de agosto la vulnerabilidad #Zerologon CVE-2020-1472 que afecta a las #Servidores… https://t.co/Smu9P3VzPh https://twitter.com/i/web/status/1314583209276051457pihcol
2020-10-09 12:10:13Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched… https://t.co/dfZYiy3jbd https://twitter.com/i/web/status/1314536109330837506EduAlmeidaRJ
2020-10-09 07:10:04Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched… https://t.co/DSLIMsGWvn https://twitter.com/i/web/status/1314460601964347394EdwardErkamps
2020-10-09 05:20:03New post: ZeroLogon(CVE-2020-1472) 分析与狩猎 https://t.co/MjJvswFeHs分析与狩猎/ https://reportcybercrime.com/zerologoncve-2020-1472-digitpol_cyber
2020-10-09 04:50:03ZeroLogon testing script (CVE-2020-1472) | Cyberwarzone https://t.co/K9Fs4nzA7L https://buff.ly/34IbvUlRikosintie
2020-10-09 03:40:02CVE-2020-1472 Zerologon as a Beacon Object File https://t.co/YLSfJ1MeSS #InfoSec #CyberSecurity #CobaltStrike #ZeroLogon #CVE https://www.youtube.com/watch?v=zGf1Rat3rEks3xcur1ty
2020-10-08 23:20:44Zero Logon - I have just completed this room! Check it out: https://t.co/BcEcOAkIC5 #tryhackme #CVE-2020-1472… https://t.co/OlITDgFFhL https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1314327638773846016greig_st
2020-10-08 20:00:04[Vulnerability] Zerologon – CVE-2020-1472 exploited in the wild https://t.co/FdfpTYk2JS https://digitalys-mag.net/vulnerability-zerologon-cve-2020-1472-exploited-in-the-wild/adelhaide1
2020-10-08 19:40:04From vulnerability to exploit, why is the CVE-2020-1472 (aka #Zerologon) causing such a ruckus in #cybersecurity ci… https://t.co/icpIxSyPzL https://twitter.com/i/web/status/1314287034408804352mbsangster
2020-10-08 19:00:04ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/DFmPnQKKtq… https://t.co/eMuWkClPbn http://dlvr.it/RjCzT1 https://twitter.com/i/web/status/1314277893946503170blueteamsec1
2020-10-08 18:30:07CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-08 17:40:02CVE-2020-1472 (#Zerologon) requires more than just patching. YES, PATCH THIS ASAP but what does the patch break tod… https://t.co/dCyrHZsMt2 https://twitter.com/i/web/status/1314258652396687360AaronMargosis
2020-10-08 16:40:11@MsftSecIntel Microsoft's multiphase response to CVE-2020-1472 (#Zerologon) is unlike any I recall, and can underst… https://t.co/jEwkf00gfC https://twitter.com/i/web/status/1314241750693752833AaronMargosis
2020-10-08 16:30:03Microsoft's multiphase response to CVE-2020-1472 (#Zerologon) is unlike any I recall, and can understandably confus… https://t.co/4IFn5b8J7z https://twitter.com/i/web/status/1314241275235835904AaronMargosis
2020-10-08 15:00:05Micropatch for Zerologon (CVE-2020-1472) https://t.co/w88uwDrH5w https://t.co/TQZfLXvEYV https://www.reddit.com/r/netsec/comments/iuoieg/micropatch_for_zerologon_cve20201472/?utm_source=dlvr.it&utm_medium=twittertechadversary
2020-10-08 14:10:06Zerologon (CVE-2020-1472): SentinelOne First to Detect on the Endpoint https://t.co/keDbB94zCU https://t.co/G5DUp234DR https://j.mp/3nixU2Tmorganwright_us
2020-10-08 13:50:03This morning we announced via the SentinelOne Blog our ability to detect Zerologon (CVE-2020-1472), a critical Micr… https://t.co/DvhfnJbSoO https://twitter.com/i/web/status/1314200758007459843v_k_2014
2020-10-08 12:20:03No ultimo vídeo eu apresento o ZeroLogon (CVE-2020-1472) que permite explorar uma vulnerabilidade de elevação de pr… https://t.co/ArHc4MaojX https://twitter.com/i/web/status/1314176367009968129DanielDonda
2020-10-08 12:10:05The #Zerologon issue (CVE-2020-1472) is being actively exploited in the wild. You need to patch your domain control… https://t.co/0hvLsmhmjc https://twitter.com/i/web/status/1314173958023983105brycea
2020-10-08 08:10:03Grâce au Patch Tuesday d’août #Microsoft a corrigé plusieurs vulnérabilités dont CVE-2020-1472. La vulnérabilité du… https://t.co/V8pYv7hUJp https://twitter.com/i/web/status/1314113421483356163kasperskyfrance
2020-10-08 08:00:06New post from https://t.co/uXvPWJy6tj (Microsoft Windows unknown vulnerability [CVE-2020-1472]) has been published… https://t.co/PGxzOgz6gi http://www.sesin.at https://twitter.com/i/web/status/1314110838765125632WolfgangSesin
2020-10-08 08:00:04New post from https://t.co/9KYxtdZjkl (Microsoft Windows unknown vulnerability [CVE-2020-1472]) has been published… https://t.co/1OxshRB2QD http://www.sesin.at https://twitter.com/i/web/status/1314110847715811328www_sesin_at
2020-10-08 08:00:03Microsoft Windows unknown vulnerability [CVE-2020-1472]: A vulnerability was found in Microsoft Windows (affected… https://t.co/RDQ68pLdcZ https://goo.gl/fb/nK3PH9threatmeter
2020-10-08 02:30:02本当にどうでもいいのだけど、MicrosoftのCVE-2020-1472(ZeroLogon)のページの「用語集」に"広告"の項目がある。用語:広告 で 定義:ActiveDirectory となってるんだけど、そもそも"広告"… https://t.co/LmkcoBxE13 https://twitter.com/i/web/status/1314029815381385216hogehuga
2020-10-07 23:50:04#CyberAttacks: #ZeroLogon Is Now Detected By #MicrosoftDefender For Identity (CVE-2020-1472 #Exploitation) -… https://t.co/m3GHpVul3I https://twitter.com/i/web/status/1313988878563450887Totocellux
2020-10-07 21:50:04Ahhhh no wonder everyone was losing their collective shit about CVE-2020-1472 and needed absolute confirmation that… https://t.co/iVXlBZlwX1 https://twitter.com/i/web/status/1313959376806391810bkmichaelg
2020-10-07 21:30:05From vulnerability to exploit, why is the CVE-2020-1472 (aka #Zerologon) causing such a ruckus in #cybersecurity ci… https://t.co/Hm4XFpPo2U https://twitter.com/i/web/status/1313952247571787785eSentire
2020-10-07 21:30:03Zero Logon - I have just completed this room! Check it out: https://t.co/UWeZpnWkFw #tryhackme #CVE-2020-1472… https://t.co/Ty6sNLVDgC https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1313953040668536833esmerlinjm
2020-10-07 21:10:02#cve20201472 - CVE-2020-1472 CVSS 10.0 Demo en Core Impact contra un DC Windows 2019 #zerologon https://t.co/PosYkJ3zql https://lnkd.in/gRZwAzMh_r_torres
2020-10-07 20:10:02@MSFT365Status Are you turning enforcement mode on for CVE-2020-1472 and half your servers are falling off the doma… https://t.co/dj6R3WwVkx https://twitter.com/i/web/status/1313934554277834753bigfoot780
2020-10-07 19:40:04Active exploitation of Zerologon (CVE-2020-1472) is noted by @Microsoft by Iranian threat group they track as “Merc… https://t.co/9BsxHbXdQQ https://twitter.com/i/web/status/1313925014408712192AdroitCyber
2020-10-07 19:20:03Zero Logon - I have just completed this room! Check it out: https://t.co/13hXE00RQk #tryhackme #CVE-2020-1472… https://t.co/oYMfweZErM https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1313919605702754305rogerss_25
2020-10-07 18:30:07CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-07 17:00:06Zero Logon - I have just completed this room! Check it out: https://t.co/wK5odnrHoF #tryhackme #CVE-2020-1472… https://t.co/5VwhgN4boz https://tryhackme.com/room/zer0logon https://twitter.com/i/web/status/1313886237439127552pidugusundeep
2020-10-07 16:20:02Como saber si tu entorno de Active Directory esta protegido contra #zerologon CVE-2020-1472 con Core Impact https://t.co/B2OFXkaSoj https://lnkd.in/eu3cFVth_r_torres
2020-10-07 14:30:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Communit… https://t.co/WZmZdDtWc4 https://twitter.com/i/web/status/1313846803272351746nichii_a
2020-10-07 09:10:05MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active… https://t.co/ICEFKnvJr9 https://twitter.com/i/web/status/1313766903391883265aburassen2
2020-10-07 08:40:05File-Manager plugin(CVE-2020-25213)とZerologon(CVE-2020-1472)の脆弱性を使った攻撃シナリオ | Using a WordPress flaw to leverage zer… https://t.co/xuspcTb8jS https://twitter.com/i/web/status/1313758801917435905muumuubokujo
2020-10-07 00:50:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Community https://t.co/jri7MESAOK https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034freude710
2020-10-06 23:50:03Test script for MS Zerologon bug. CVE-2020-1472 https://t.co/mgp52XkIPT https://github.com/SecuraBV/CVE-2020-1472/blob/master/zerologon_tester.pyr00tpgp
2020-10-06 22:00:11We’re seeing more activity leveraging the CVE-2020-1472 exploit (ZeroLogon). A new campaign shrewdly poses as softw… https://t.co/6UYRpPBneC https://twitter.com/i/web/status/1313598440719355904MsftSecIntel
2020-10-06 22:00:04We’re seeing more activity leveraging the CVE-2020-1472 exploit (ZeroLogon). A new campaign shrewdly poses as softw… https://t.co/JMtmlxnD1E https://twitter.com/i/web/status/1313599305790500864dondiwest
2020-10-06 21:40:07CVE-2020-1472 "ZeroLogon" by researcher Tom Tervoort has 35+ PoC exploits. This allows attackers to impersonate any… https://t.co/4UFzkTmASH https://twitter.com/i/web/status/1313593490966638592cvebase
2020-10-06 19:20:02Drop everything & go patch CVE-2020-1472, aka “Zerologon.” 👀🔐 Our latest Threat Labs podcast explains why.… https://t.co/gTTlk81gk0 https://twitter.com/i/web/status/1313558936654688256JuniperNetworks
2020-10-06 18:30:10CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-06 17:50:03Microsoft warns that the MERCURY APT has been actively exploiting CVE-2020-1472 in campaigns for the past two weeks… https://t.co/4IOSARt0nr https://twitter.com/i/web/status/1313535666815291392iamTdivyesh
2020-10-06 17:10:04If you can't patch CVE-2020-1472 (#Zerologon) because your domain controllers are Windows Server 2008 R2, @0patch h… https://t.co/cF2BJ9Qakp https://twitter.com/i/web/status/1313526401778225152mkolsek
2020-10-06 16:20:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Communit… https://t.co/3gniUTD94U https://twitter.com/i/web/status/1313513861950042112Go_NGYO
2020-10-06 16:10:05A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/1FkR4B6ddz https://twitter.com/i/web/status/1313509428696580098Kasperskybrasil
2020-10-06 15:50:02[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/BGXW3vnHx6 https://www.secura.com/blog/zero-logonK1N0SA
2020-10-06 15:20:04ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/Cun4TmcjeR… https://t.co/aIbIdPobHO https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3yKcYcBSpg.twitter https://twitter.com/i/web/status/1313498722630684672DaveKawula
2020-10-06 13:20:02“ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Communi… https://t.co/3VbL6HWHjn https://twitter.com/i/web/status/1313468159773433858modokey
2020-10-06 12:40:05MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon): https://t.co/fMMEg9UMSa https://twitter.com/MsftSecIntel/status/1313246337153077250780thC
2020-10-06 12:30:04Microsoft warns that the Iran-linked MuddyWaters group is exploiting the ZeroLogon vulnerability (CVE-2020-1472) in… https://t.co/pt3H5s5Hwx https://twitter.com/i/web/status/1313454717520019456virusbtn
2020-10-06 10:10:02The #vulnerability CVE-2020-1472 aka #Zerologon is being exploited by #cyberespionage group #MuddyWater.… https://t.co/qEQkVOY5FW https://twitter.com/i/web/status/1313419742963814406twelvesec
2020-10-06 09:40:04How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472… https://t.co/hDbKNFkinR https://twitter.com/i/web/status/1313411711425101824TWCERTCC
2020-10-06 08:00:03ZeroLogon Exploit - Abusing CVE-2020-1472 (Way Too Easy!) https://t.co/KaiJVsw0SB http://dlvr.it/Rj2C7Cnetsecstudents
2020-10-06 07:40:02CVE-2020-1472を突くネットワークIDS/IPSのシグネチャですが、オリジナルで書きかきする際の参考情報です。papa_anniekey
2020-10-06 06:20:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/zergJF2OGT https://amzc.news/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve-2020-1472-exploitationpdominjon
2020-10-06 05:40:02CVE-2020-1472 DCERPC NetrServerReqChallenge (Opnum 4) (\x00){8}$ not include Auth type == 68 でも平文だとauth type==68はリストないからどうするかpapa_anniekey
2020-10-06 05:30:04new video just dropped by thecybermentor ... ZeroLogon Exploit - Abusing CVE-2020-1472 (Way Too Easy!)... watch, li… https://t.co/8CglR3Oa6F https://twitter.com/i/web/status/1313348529507782657infenet
2020-10-06 05:30:03Zerologon Exploit- Abusing CVE-2020-1472 tutorial here. #Zerologon #exploit #ad #Windows10 https://t.co/3C8x3slcQA https://youtu.be/6xMGsdD-ArIashrav_jain
2020-10-06 03:10:03“ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Communi… https://t.co/nTKty9kPi4 https://twitter.com/i/web/status/1313314982717648896tukanana
2020-10-06 00:20:04ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/G8T0EfSQYk https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3u14WfeSyI.twitterka0com
2020-10-05 23:10:04ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - https://t.co/kGmagBvXDY https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034?WT.mc_id=M365-MVP-4038268directorcia
2020-10-05 23:00:03MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active… https://t.co/d1DJ7pYwWi https://twitter.com/i/web/status/1313252181911445504dondiwest
2020-10-05 23:00:03Make sure to patch for CVE-2020-1472 https://t.co/bBWcysiNaa https://twitter.com/msftsecintel/status/1313246337153077250s_adachi
2020-10-05 22:40:13MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active… https://t.co/lXvOBomFoq https://twitter.com/i/web/status/1313246337153077250MsftSecIntel
2020-10-05 21:20:03CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability | An elevation of p https://t.co/UCpwYZzbMH http://ow.ly/1Fz130rdu15JayFerron
2020-10-05 20:50:49A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/qVrfImlRLc https://twitter.com/i/web/status/1313170026640408584velez1066
2020-10-05 18:40:13A spike in exploitation attempts against the #Microsoft #vulnerability CVE-2020-1472, known as the #Zerologon #bug,… https://t.co/NpPZkY61wl https://twitter.com/i/web/status/1313184817731821570jonesit_sf
2020-10-05 18:30:06CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-05 16:20:03Reminder about mitigating against the #Zerologon security vulnerability. Patch today! CVE-2020-1472 | Netlogon Elev… https://t.co/Q2fD2QYPxp https://twitter.com/i/web/status/1313150738206535680adaptiva
2020-10-05 15:20:03CVE-2020-1472 and @CiscoSecure •Orbital in Action: https://t.co/mEU4azJy5X •Exploiting the Domain Controller:… https://t.co/Ze1vdNDFyt https://youtu.be/BEJubBXoYro https://twitter.com/i/web/status/1313135141607428098FE80CC1E
2020-10-05 14:10:03Une augmentation des tentatives d'exploitation contre la vulnérabilité Microsoft CVE-2020-1472, connue sous le nom… https://t.co/1HJNQnlQtS https://twitter.com/i/web/status/1313117904850817025TechSecuriteNew
2020-10-05 12:00:05CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/MtkPOH1dCa @YouTubeより https://youtu.be/1h_wlMWwyB4py_kanade
2020-10-05 12:00:03Network Detection for ZeroLogon (CVE-2020-1472) #NetworkDetection #CVE #Exploit #Vulnerability #PenTest #InfoSec… https://t.co/KnlWiW5ZD7 https://twitter.com/i/web/status/1313084871657521154itsoftgmbh
2020-10-05 11:30:02Read Tanium's guidance on how to Find and Remediate “Zerologon” (CVE-2020-1472) Updated on 9/28 https://t.co/wlzNLjEfrK https://community.tanium.com/s/article/How-Tanium-Can-Help-Remediate-Zerologon-CVE-2020-1472mtravers
2020-10-05 09:10:04ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/aZXYXmNtYH #MSFTAdvocate https://lnkd.in/dbYE8KWMarcoDalPino
2020-10-05 09:10:03@wdormann When scanning for patches on Tuesday August related to CVE-2020-1472 vulnerabilities, the following list… https://t.co/6zQUe9NN20 https://twitter.com/i/web/status/1313043143294550016kwi01072
2020-10-05 07:10:05#ZeroLogon is now detected by #MicrosoftDefender for Identity (CVE-2020-1472 exploitation)… https://t.co/Aky7uOTQc2 https://twitter.com/i/web/status/1313011329662431234ThomasKurth_ch
2020-10-05 06:40:07New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/63OiucLjmL https://lnkd.in/d6_VA2vMacksta2
2020-10-05 03:30:02ชำแหละ Zerologon (CVE-2020-1472) https://t.co/EPGBiS1b4C CR: Witsarut L. #ISMTechnology #ISMSharingContent https://medium.com/incognitolab/%E0%B8%8A%E0%B8%B3%E0%B9%81%E0%B8%AB%E0%B8%A5%E0%B8%B0-zerologon-cve-2020-1472-cabe92baa8e5ISMTechnology
2020-10-05 02:00:02Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/APxBUOwXix https://t.co/qcIhPfQOQ4 https://www.reddit.com/r/netsec/comments/itmukx/instantly_become_domain_admin_by_subverting/?utm_source=dlvr.it&utm_medium=twittertechadversary
2020-10-04 23:00:03“ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/rrUgUlCYWd https://htn.to/PaWAkRM8mdkwdnet
2020-10-04 23:00:02“ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/rrUgUllo4F https://htn.to/PaWAkRM8mdkwdnet
2020-10-04 21:40:03#sharepoint ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft T… https://t.co/XknU5ukCJN https://twitter.com/i/web/status/1312869510668484613ricardo_calejo
2020-10-04 21:00:03How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 #infosec #soc #ciso https://t.co/NNGeVYTEP5 https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocopexxx
2020-10-04 18:30:06CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-04 16:20:02Did you know? ZeroLogon ( (CVE-2020-1472 ) is now detected by Microsoft Defender. https://t.co/oSggZrwfoyJosephZaheer
2020-10-04 14:10:02ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/o7iYGHODua https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3kXvqSNsJs.twitterHackCoOrg
2020-10-04 13:30:02#CVE #Netlogon CVE-2020-1472 通過Netlogon獲得管理員權限 https://t.co/kUezwV2pL6 https://wiki.ixinian.com/xi-tong-lou-dong/windows/cve20201472-tong-guo-netlogon-huo-de-guan-li-yuan-quan-xianAcardia2020
2020-10-04 10:10:04Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched… https://t.co/YwcJF7mvRr https://twitter.com/i/web/status/1312693962558386176cdnjmac
2020-10-04 06:10:03Did you know? #ZeroLogon is now detected by Microsoft Defender for Identity - ex Azure ATP (CVE-2020-1472 exploitat… https://t.co/lVoFknVCgZ https://twitter.com/i/web/status/1312633693068984320ArtyomSinitsyn
2020-10-03 20:10:02Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range https://t.co/nNZjRgYFux https://lnkd.in/eak44RRMMShippy
2020-10-03 18:30:05CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-03 16:10:03A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/UwfGOiDETr https://twitter.com/i/web/status/1312422544851562497Kasperskybrasil
2020-10-03 15:50:02Cisco Endpoint AMP: Orbital Threat Hunting - CVE-2020-1472 Monitoring- Zerologon Vulnerability https://t.co/mEU4azJy5X https://youtu.be/BEJubBXoYroFE80CC1E
2020-10-03 13:30:02A critical CVSS:10 vulnerability (CVE-2020-1472) in the Microsoft Netlogon process. Zerologon Arabic art:… https://t.co/qKzaYfQMrZ https://twitter.com/i/web/status/1312383901025865731Sud0root
2020-10-03 13:10:03Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range https://t.co/H8lKTm60Ox https://lnkd.in/ewKMr_Hfwijnholds
2020-10-03 05:00:02New post: ZeroLogon(CVE-2020-1472) 漏洞的攻击与防御策略(下) https://t.co/MjJvswFeHs漏洞的攻击与防御策略(下)/ https://reportcybercrime.com/zerologoncve-2020-1472-digitpol_cyber
2020-10-03 01:50:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/gbeGbvLjvI https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3fXGVc19wA.twittermatthew_sec
2020-10-02 18:30:08CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-02 16:40:03Zerologon is the name that has been given to a vulnerability identified in CVE-2020-1472. Due to the flaw in the lo… https://t.co/npWZ2WVJpA https://twitter.com/i/web/status/1312069179789336576CERTstation
2020-10-02 15:20:05#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/f1cOwDSncN https://twitter.com/i/web/status/1312047335267086338deepwatch_sec
2020-10-02 14:10:04Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched… https://t.co/khGKz6uWwY https://twitter.com/i/web/status/1312029593113690113rbecwar
2020-10-02 13:10:04reminder that - CVE-2020-1472 is going to make your day very bad if you can't prevent, detect or respond fast enuf… https://t.co/gSo2GdwutP https://twitter.com/i/web/status/1312016087576346626UK_Daniel_Card
2020-10-02 12:50:07'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/JfOMF89JoA https://twitter.com/i/web/status/1312010185007796224dansantanna
2020-10-02 10:30:03Microsoft's security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched or lack… https://t.co/5t74UJ8zfJ https://twitter.com/i/web/status/1311974784339783681rhensenbu
2020-10-02 07:50:02ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/6UAF7Xz2MX… https://t.co/MofrChlvCs https://ift.tt/2Sjo4PO https://twitter.com/i/web/status/1311936374531072000AIHammer
2020-10-02 07:20:05#LIVE Webinar on Zerologon Vulnerability (CVE-2020-1472) : Technical Analysis and Detection Register to join… https://t.co/ooGqm1pXAU https://twitter.com/i/web/status/1311926506097180675sirajs0l
2020-10-02 07:10:04How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/8kFi30Qswx https://ift.tt/2Sg2f3Veyalestrin
2020-10-02 02:20:04How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/WzhJz9H5YL https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocohhara_shiojiri
2020-10-02 00:40:06ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/IZxHMl6ezm https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3Z1NieYxxo.twitterHackCoOrg
2020-10-02 00:40:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/G3N4d6Tp4k <… https://t.co/0BgBf4Df60 https://buff.ly/36qDyd5 https://twitter.com/i/web/status/1311827246244605954bschorr
2020-10-01 23:40:03Network Detection for ZeroLogon (CVE-2020-1472) https://t.co/gwqdd49E8m #Pentesting #CVE #Vulnerability #Exploit… https://t.co/sJmQZkLDPp https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/network-detection-for-zerologon-cve-2020-1472/ https://twitter.com/i/web/status/1311811173512347651ptracesecurity
2020-10-01 22:50:03ZeroLogon (CVE-2020-1472) https://t.co/gOilcqccsR via @YouTube https://youtu.be/U_1RTCl63hcDanielDonda
2020-10-01 22:30:04ZeroLogon (CVE-2020-1472) https://t.co/gOilcqccsR https://youtu.be/U_1RTCl63hcDanielDonda
2020-10-01 22:20:04Microsoft today shared some exploit research on its Windows Server Netlogon vulnerability (CVE-2020-1472), with hin… https://t.co/ND4Q2Cd0b3 https://twitter.com/i/web/status/1311791198772711424kurmac
2020-10-01 21:20:04Interesting approach to patch Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472). Amazing micropatch w… https://t.co/vT7zKopzJm https://twitter.com/i/web/status/1311777074160504833FAllendesF
2020-10-01 20:50:13CVE-2020-1472 = IDDQD. Solo para grupos de riesgorsanchez3270
2020-10-01 20:20:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Community https://t.co/HFBexa5cxO https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034opexxx
2020-10-01 19:40:03Zerologon (CVE-2020-1472): SentinelOne First to Detect on the Endpoint https://t.co/oD9pNAzzE1 https://s1.ai/wHkPHmbrittradams
2020-10-01 19:10:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/Dl56XdsNzM https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034#.X3YpE2v42h4.twitterarkka1
2020-10-01 19:00:06ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsoft Tech Community https://t.co/xReP4F6YRr https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034bartvvugt
2020-10-01 19:00:05@c3di1 CVE-2020-14727374657665_
2020-10-01 18:40:10Customers with Microsoft 365 Defender can get additional guidance for CVE-2020-1472 Netlogon Elevation of Privilege… https://t.co/WzJVdEKnAy https://twitter.com/i/web/status/1311735621900214273RavivTamir
2020-10-01 18:30:08CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-10-01 18:30:07In case you missed it - ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/tWsxm07QhA https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034RavivTamir
2020-10-01 17:30:04ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/mkUcKC2amh… https://t.co/3CEzj9OCph https://buff.ly/30qzINk https://twitter.com/i/web/status/1311717834695868416ITOpsTalk
2020-10-01 17:00:04New Zerologon (CVE-2020-1472) signatures added to the Sagan rule sets. Log analysis & packet analysis signatures… https://t.co/0ePh7m0h8q https://twitter.com/i/web/status/1311711560319021057Quadrantsec
2020-10-01 16:40:07ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/QDRgurhSfv #MSFTAdvocate https://lnkd.in/d78EihrMarcoDalPino
2020-10-01 16:20:03How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/MnpbClFVg3 https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocPVynckier
2020-10-01 15:50:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/e9ZmoMcRbz… https://t.co/WX9FZN13z6 https://buff.ly/30qzINk https://twitter.com/i/web/status/1311692862011117573MsftTechNews
2020-10-01 15:30:03【読んだ】ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog ( https://t.co/xQiAiY60wA ) https://ift.tt/2S3UpKxnonokao
2020-10-01 14:20:06La vulnérabilité CVE-2020-1472 du protocole #Netlogon, alias #Zerologon, permet aux cybercriminels de pirater les c… https://t.co/W99WuPxLnU https://twitter.com/i/web/status/1311670132461182976kasperskyfrance
2020-10-01 13:50:02How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/QhetUC8X1S https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocL4rryC4rson
2020-10-01 12:20:06ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) - Microsof... (https://t.co/c5Y8Y3KmDT) https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034WhatDigital
2020-10-01 12:00:05ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/InJBhZljej #MVPBuzz https://bit.ly/2Gex86kjcastanedacano
2020-10-01 12:00:04We've published new details on in the wild ZeroLogon (CVE-2020-1472) detection at Microsoft - including some huntin… https://t.co/M3Qv9e2Hk1 https://twitter.com/i/web/status/1311635550747721729GossiTheDog
2020-10-01 12:00:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/XTjKa4Y3WN #Microsoft https://techcommunity.microsoft.com/t5/microsoft-365-defender/zerologon-is-now-detected-by-microsoft-defender-for-identity-cve/ba-p/1734034MSITProNews
2020-10-01 11:50:03ZeroLogon is now detected by Microsoft Defender for Identity (CVE-2020-1472 exploitation) https://t.co/XJlW1ngYW1 http://dlvr.it/RhkYPxEverythingMS
2020-10-01 11:40:02めちゃわかりやすい RT CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/oaOPwOwUZR @YouTubeより https://youtu.be/1h_wlMWwyB4nakayoshi7
2020-10-01 11:10:03CVE-2020-1472: Microsoft publiziert verständliche Patch-Anleitung "Zerologon" ist eine höchst kritische Lücke, aber… https://t.co/XsZ0Eh7vle https://twitter.com/i/web/status/1311621946640130048inside_channels
2020-10-01 11:10:03New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/uCCJSSEmVc https://lnkd.in/eF2E9rTMrBarryBrown
2020-10-01 10:40:04CVE-2020-1472: Microsoft publiziert verständliche Patch-Anleitung "Zerologon" ist eine höchst kritische Lücke, aber… https://t.co/jHMqt1Ldju https://twitter.com/i/web/status/1311614400718086145inside_it
2020-10-01 08:50:05‼️ Cyber Alert ‼️ Microsoft have identified vulnerabilities affecting Microsoft Windows Netlogon, or CVE-2020-1472.… https://t.co/LrxsP3nAj6 https://twitter.com/i/web/status/1311587273998295040DurhamCyber
2020-10-01 07:30:03TheHackersNews: LIVE Webinar on Zerologon Vulnerability (CVE-2020-1472) : Technical Analysis and Detection Registe… https://t.co/4nX41aqK4o https://twitter.com/i/web/status/1311566649892442118B01Group
2020-10-01 07:10:02@TheHackersNews : LIVE Webinar on Zerologon Vulnerability (CVE-2020-1472) : Technical Analysis and Detection Regis… https://t.co/0zMFWsaRlU https://twitter.com/i/web/status/1311562059881099266byHoRRoR
2020-10-01 04:10:02CVE-2020-1472 aka Zerologon | From Nobody to Admin https://t.co/fKmeHdELO0 https://buff.ly/3cKCYbtsafepassme
2020-10-01 04:00:03Windows event log errors related to CVE-2020-1472 (Netlogon/ZeroLogon): There are three categories of events: 1. E… https://t.co/2IOFuTGcEh https://twitter.com/i/web/status/1311514443562450946FAllendesF
2020-09-30 23:10:03Late again, but still ^_^ Older Vulnerabilities with exploits - “#Zerologon” #Netlogon RCE (CVE-2020-1472) - EoPs i… https://t.co/mBzM2L0enM https://twitter.com/i/web/status/1311442811515023363leonov_av
2020-09-30 21:30:04How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472… https://t.co/oidQMGwjPy https://twitter.com/i/web/status/1311417034383687681bschorr
2020-09-30 21:00:16#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/dGTMFxQ03Y https://twitter.com/i/web/status/1311408014574919681deepwatch_sec
2020-09-30 18:30:08CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-30 18:00:03“A spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, known as the Zerologon bug, co… https://t.co/JTJZBJ95u0 https://twitter.com/i/web/status/1311365195307134981cyberprotectgrp
2020-09-30 17:40:07A different way of abusing Zerologon (CVE-2020-1472) (via @_dirkjan) https://t.co/9eDk3OkUoV https://buff.ly/33SSttSlordman1982
2020-09-30 17:40:03Q re CVE-2020-1472 #Zerologon: the MS patch defines 5 new events that can be reported in a DC's System event log to… https://t.co/Bf1CYFLT5g https://twitter.com/i/web/status/1311359770826362881AaronMargosis
2020-09-30 17:10:11So cool to be the first endpoint vendor to introduce detection for #ZeroLogon (CVE-2020-1472). Watch the demo:… https://t.co/uofooJ72rj https://twitter.com/i/web/status/1311350555814420485MigoKed
2020-09-30 17:00:10CVE-2020-1472 Zerologon attack helps hackers to take over corporate networks. Microsoft warned that malicious cyber… https://t.co/Cag5zJdNkm https://twitter.com/i/web/status/1311348793045065728the_encrypt
2020-09-30 16:50:10SentinelOne : ⚡ Live: SentinelOne the ONLY endpoint security vendor to detect #Zerologon (CVE-2020-1472). Our paten… https://t.co/r7vmltTJda https://twitter.com/i/web/status/1311345666204065796BThurstonCPTECH
2020-09-30 16:50:03"SentinelOne the ONLY endpoint security vendor to detect #Zerologon (CVE-2020-1472). " *stares at thousands of blo… https://t.co/WFCFFrsTgI https://twitter.com/i/web/status/1311347272324722688GossiTheDog
2020-09-30 16:40:16⚡ Live: SentinelOne the ONLY endpoint security vendor to detect #Zerologon (CVE-2020-1472). Our patented behavioral… https://t.co/YE3RSFYdPu https://twitter.com/i/web/status/1311343440647434241SentinelOne
2020-09-30 16:40:10#Zerologon (CVE-2020-1472): .@SentinelOne First to Detect on the Endpoint https://t.co/1QogUOG8G2 https://s1.ai/wHkPHmGutmanYotam
2020-09-30 16:40:03Zerologon (CVE-2020-1472): SentinelOne First to Detect on the Endpoint https://t.co/KrF3tunScG https://bit.ly/34aniKJpigram86
2020-09-30 16:10:07A week after active exploits of CVE-2020-1472 first appeared, exploitation attempts continue to rise. CISA has alre… https://t.co/AEgfBdfK95 https://twitter.com/i/web/status/1311335018799730689AutomoxApp
2020-09-30 16:10:06A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/c2ej79TfRS https://twitter.com/i/web/status/1311335286115373057Kasperskybrasil
2020-09-30 16:10:03#vulnerabilidad Zerologon, nuevo CVE-2020-1472 recientemente descubierto, permite al atacante aprovechar el algorit… https://t.co/MCSAIG5LSX https://twitter.com/i/web/status/1311337164920283142TrendMicroES
2020-09-30 15:30:04LIVE Webinar on Zerologon Vulnerability (CVE-2020-1472) : Technical Analysis and Detection Register to join… https://t.co/eKkR3j9Mnw https://twitter.com/i/web/status/1311326457075912704TheHackersNews
2020-09-30 15:30:03How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/MiE5SSKJxf https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocRRalstonAgile
2020-09-30 15:10:05Last month, #Microsoft released a patch for critical vulnerability CVE-2020-1472, also known as the Zerologon vulne… https://t.co/VZtOkGA3N0 https://twitter.com/i/web/status/1311320035013656576kaspersky
2020-09-30 15:10:05Microsoft clarifies patch confusion for Windows Zerologon flaw (CVE-2020-1472) via @BleepinComputer #Proficio… https://t.co/QWskLApk9S https://twitter.com/i/web/status/1311319903534628866proficioinc
2020-09-30 15:10:04#CVE-2020-1472 #ZeroLogon Alert: ‘Critical’ Windows Vulnerability Needs Your Attention. The @Keysight_ATI team put… https://t.co/lz9CIPw50E https://twitter.com/i/web/status/1311320963846414337KeysightNAS
2020-09-30 15:00:03More on CVE-2020-1472 and patching DC's. ISC Stormcast For Wednesday, September 30th 2020 https://t.co/xkoEGPVXRW… https://t.co/TTDx8qTkoe https://isc.sans.edu/podcastdetail.html?id=7 https://isc.sans.edu/diary/rss/26618L4rryC4rson
2020-09-30 14:10:03話題のZerologon(CVE-2020-1472)の悪用可能性指標は、悪用例が確認されたとの発表があった現在も「2 - 悪用される可能性は低い」のままです。 https://t.co/iuhlJRMLI2 https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2020-1472am7cinnamon
2020-09-30 12:10:05“ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/ehV5s05eb5 https://htn.to/2hsXZweVeWrokumai
2020-09-30 12:00:02CVE-2020-1472 is a Windows vulnerability that allows an unauthenticated device to compromise your Microsoft Windows… https://t.co/p7a7scQGkq https://twitter.com/i/web/status/1311274589977227268SolutionsPT
2020-09-30 11:40:04What You Need To Know About Zerologon: Microsoft released an update for CVE-2020-1472 (now known as Zerologon) on A… https://t.co/cURBg5pctA https://twitter.com/i/web/status/1311267818331992065shah_sheikh
2020-09-30 11:00:05We have updated the KB article for CVE-2020-1472 Netlogon to provide clarity on customers actions to ensure they ar… https://t.co/2miew9mU7Q https://twitter.com/i/web/status/1311256996730068992ArtyomSinitsyn
2020-09-30 09:40:04ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/NOuT5dKOt7 #security https://piyolog.hatenadiary.jp/entry/2020/09/28/124522G76whizkidz
2020-09-30 08:50:03Technical details of CVE-2020-1472 (Zerologon) https://t.co/JnrBSOexpr #zerologon #cve #crypto #aescfb https://www.secura.com/pathtoimg.php?id=2055philomath213
2020-09-30 07:40:04A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/AWTafZKdQg https://twitter.com/i/web/status/1311207490663649281BharatM15try
2020-09-30 05:20:03POCでさえもログから攻撃発生の判別が厳しいのに、耳つかったらもっとわかりにくいじゃないか…とりあえず言える事は、とっととパッチあてなさい、ですね。CVE-2020-1472 https://t.co/91oEspCrAfpapa_anniekey
2020-09-30 03:50:04ZeroLogon AD DC CVSS of 10 CVE-2020-1472 #cve20201472 https://t.co/DKPR5uQin4 https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/NicholasLeader
2020-09-30 03:20:03Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/yp4iupFK0k https://t.co/ppOWGRBFe2 https://www.reddit.com/r/netsec/comments/irwd3d/test_tool_for_cve20201472_dc_auth_bypass/?utm_source=dlvr.it&utm_medium=twittertechadversary
2020-09-30 03:00:02モストオブわかりやすいZerologon ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/LT9odEeKo5 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522maguro_infra
2020-09-30 01:10:03ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/A23yAzrEDu https://piyolog.hatenadiary.jp/entry/2020/09/28/124522Pyo0072
2020-09-30 00:40:03Acabei de testar o "Zerologon: CVE-2020-1472" em um ambiente de teste e acho que vale um vídeo de uns 5 minutos não… https://t.co/FXbbNrqhLY https://twitter.com/i/web/status/1311102871803490304DanielDonda
2020-09-29 22:30:06@TalosSecurity is tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an e… https://t.co/jdJu8KjYBq https://twitter.com/i/web/status/1311068898670731269jc_vazquez
2020-09-29 22:30:05Microsoft specifies patching of the Netlogon vulnerability (CVE-2020-1472) https://t.co/NLYTHJOaL6 #CVE-2020-1472… https://t.co/sxOMye4AQ0 https://borncity.com/win/?p=16133 https://twitter.com/i/web/status/1311069207979790336etguenni
2020-09-29 22:20:05Microsoft präzisiert das Patchen der Netlogon-Schwachstelle (CVE-2020-1472) https://t.co/IKMLXaIzlh #CVE-2020-1472… https://t.co/Uzuej3RtFC https://www.borncity.com/blog/2020/09/30/microsoft-przisiert-das-patchen-der-netlogon-schwachstelle-cve-2020-1472/ https://twitter.com/i/web/status/1311065835000258562etguenni
2020-09-29 21:20:03Learn how to detect the CVE-2020-1472 Zerologon exploitation without signatures or agents, using @ExtraHop Reveal(x… https://t.co/vzLGRBMeQg https://twitter.com/i/web/status/1311051678809026561ToHyphenOrNot
2020-09-29 20:50:08ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた https://t.co/nyLZ9n0W9V https://piyolog.hatenadiary.jp/entry/2020/09/28/12452201ra66it
2020-09-29 20:50:07A thread of activity I've seen around Zerologon/CVE-2020-1472, if it helps anybody. Mute conversation away.GossiTheDog
2020-09-29 20:50:07脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 https://t.co/1WmYs9420p https://blog.trendmicro.co.jp/archives/2620601ra66it
2020-09-29 18:30:07CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-29 16:20:03Microsoft's #patch for the CVE-2020-1472 #vulnerability in the #Netlogon protocol aka #Zerologon is an update you s… https://t.co/vBrZSXi6um https://twitter.com/i/web/status/1310977050686230533lgomezperu
2020-09-29 16:10:04#Microsoft's patch for the CVE-2020-1472 vulnerability in the Netlogon protocol aka Zerologon is an update you shou… https://t.co/3KVPXYhw5d https://twitter.com/i/web/status/1310972750727729159kaspersky
2020-09-29 14:30:05.@NCSC UK are advising UK organisations to patch for CVE-2020-1472 aka Zerologon, and on detection details. https://t.co/GcRqfGsLBz https://www.ncsc.gov.uk/news/alert-organisations-should-patch-netlogon-vulnerabilityGossiTheDog
2020-09-29 14:30:04TalosSecurity: We're tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, a… https://t.co/mLFSjzVb2k https://twitter.com/i/web/status/1310949603676770305southerncyber
2020-09-29 14:10:04How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/CXa35GOyay https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocbebinjo
2020-09-29 13:40:02Zerologon (CVE-2020-1472) | Demo: Explotación y prevención https://t.co/fhJ7KV5QVq #Zerologon #seguridadinformatica https://youtu.be/uabY1WZXQiMlifydouglaspain
2020-09-29 13:20:03We're tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an elevation of… https://t.co/HqdMJ51uGg https://twitter.com/i/web/status/1310930612551856130TalosSecurity
2020-09-29 12:50:02Cisco Talos is tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an elev… https://t.co/jLAmlkvcMz https://twitter.com/i/web/status/1310924761866727424Cyber_O51NT
2020-09-29 10:10:03The ZeroLogon Windows Flaw Vulnerability (CVE-2020-1472) See here the steps to protect yourselves:… https://t.co/HkRyFM8o30 https://twitter.com/i/web/status/1310884128280268801SysteComSA
2020-09-29 09:10:05New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/ApkqMw9VKL https://lnkd.in/dnJPU5KStefaniaIvanciu
2020-09-29 08:30:0320件のコメント https://t.co/v6cKXZ0ORy “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/YC8qa0Mpnq https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/n2fcL9133cnegima1976
2020-09-29 08:10:10"Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerabili… https://t.co/3ZIruGZZHz https://twitter.com/i/web/status/1310852523138281472sarvvid
2020-09-29 08:10:04“ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” (187 users) https://t.co/KMDYKFkHhs https://htn.to/2uKeeuc8DyCujo3
2020-09-29 07:40:07CVE-2020-1472 Útočníci aktívne zneužívajú zraniteľnosť Windows serverov nazvanú „Zerologon“, odporúčame okamžitú ak… https://t.co/LuJVZe8vxE https://twitter.com/i/web/status/1310844745594343424CSIRT_SK
2020-09-29 07:30:05New post: Cyberwatch – Recommandations sur la vulnérabilité CVE-2020-1472 (ZeroLogon) https://t.co/iODhBc7FlA https://reportcybercrime.com/cyberwatch-recommandations-sur-la-vulnerabilite-cve-2020-1472-zerologon/digitpol_cyber
2020-09-29 07:20:04From @msftsecresponse We have updated the KB article for CVE-2020-1472 to provide clarity on customers actions to e… https://t.co/V5gPRujSeh https://twitter.com/i/web/status/1310840402392514567argevise
2020-09-29 07:20:04From @msftsecresponse We have updated the KB article for CVE-2020-1472 to provide clarity on customers actions to e… https://t.co/7LQQ9GIo4x https://twitter.com/i/web/status/1310839910828511232argevise
2020-09-29 07:00:05Cyberwatch - Recommandations sur la vulnérabilité CVE-2020-1472 (ZeroLogon) https://t.co/CNHGBdMqYZ https://bit.ly/2G9fVenGS_Mag
2020-09-29 07:00:04Is CVE-2020-1472 the new MS17-010?😊Are you here to stay CVE-2020-1472???🙃lorde_zw
2020-09-29 06:00:07A different way of abusing Zerologon (CVE-2020-1472) https://t.co/OAfUmBuPCj https://dirkjanm.io/a-different-way-of-abusing-zerologon/Tinolle1955
2020-09-29 05:40:05Windows Netlogon Elevation of Privilege Vulnerability CVE-2020-1472 https://t.co/PQLZAcHLUA https://securitynews.sonicwall.com/xmlpost/windows-netlogon-elevation-of-privilege-vulnerability-cve-2020-1472/BRChelmo
2020-09-29 05:30:06Zerologon is the name that has been given to a vulnerability identified in CVE-2020-1472. It’s called zerologon due… https://t.co/kKmcBJPeqj https://twitter.com/i/web/status/1310813253639962627twit_krgz
2020-09-29 05:30:05Über Microsoft Edge geteilt: Verwalten der Änderungen in den sicheren Netlogon Kanalverbindungen, die CVE-2020-1472… https://t.co/Zq5P6H8ZvL https://twitter.com/i/web/status/1310813536751423488rniedhorn
2020-09-29 05:30:05Microsoft released a patch for CVE-2020-1472 (Zerologon). All AD servers (2008 R2 and above) should be patched as s… https://t.co/2cveFvcw34 https://twitter.com/i/web/status/1310813268353507328twit_krgz
2020-09-29 04:10:04最大級にヤバイ。 "本脆弱性は容易に悪用できる上に、悪用された場合の影響が非常に大きいことから、最優先で対策を実施いただくことを推奨します。" Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な… https://t.co/eJJSxfQ00e https://twitter.com/i/web/status/1310792348058542081maruyamatk
2020-09-29 04:10:04これヤバいのでは。。。 ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/6zvM3celdh https://piyolog.hatenadiary.jp/entry/2020/09/28/124522maruyamatk
2020-09-29 03:30:02A new CVE-2020-1472 Zerologon was released recently has made quite a few headlines. Join us live on Oct 1st at 11AM… https://t.co/L1p0h4XJ70 https://twitter.com/i/web/status/1310783808401223680TrendMicroANZ
2020-09-29 03:20:09【注意喚起】 Microsoft製品(Windows Server)の脆弱性について、IPAが 改めて 注意喚起をしています(CVE-2020-1472)。 攻撃が行われた場合の影響が大きいため、2020年8月の月例更新プログラム… https://t.co/3WKqPdJEdA https://twitter.com/i/web/status/1310780794537824256nisc_forecast
2020-09-29 02:30:03A new CVE-2020-1472 Zerologon was released recently and made quite a few headlines. Join us live Oct 10th at 11AM A… https://t.co/XSeK5z29wO https://twitter.com/i/web/status/1310767490046324737TrendMicroANZ
2020-09-29 02:10:04Zerologon(CVE-2020-1472)の悪用が確認されたとして、マイクロソフトや各国のセキュリティ機関が注意喚起しています。 更新プログラムは8月にリリースされていますが、ADサーバーともなると変更管理が厳重でタイムリー… https://t.co/2bcV2c70sx https://twitter.com/i/web/status/1310761996606791680ns_lsc
2020-09-29 02:10:03Cibercriminales están explotando activamente exploits para la vulnerabilidad CVE-2020-1472 Netlogon EoP, apodada Ze… https://t.co/oEy6fm6Jgy https://twitter.com/i/web/status/1310762469888077826Mnemo_Colombia
2020-09-29 02:00:06MSのパッチの件、動作がよくわからんなぁ CVE-2020-1472 監視はできる体制はとっているのだけど。papa_anniekey
2020-09-29 01:00:02ALERTA DE SEGURIDAD: La explotación de la vulnerabilidad CVE-2020-1472, conocida como Zerologon, escala privilegio… https://t.co/3vVnOaLumK https://twitter.com/i/web/status/1310746112467243008_SecureSoft
2020-09-29 00:50:02ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog #サイバー攻撃 #サイバーセキュリティ #ドメインコントロラ #Zerologon https://t.co/bbdBRbEB93 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522ntsbook
2020-09-29 00:40:03Netlogonの脆弱性 CVE-2020-1472 必要となる対処(パッチの適用)に関するKB。寄せられているQAをアップデートしました。AD管理者の方はぜひご参照を https://t.co/3WFrDmuAhb https://support.microsoft.com/en-us/help/4557222EurekaBerry
2020-09-29 00:30:03Zerologonの僕の動画を紹介してくれているQiitaの記事がありました! ありがとうございます! Zerologon (CVE-2020-1472) 「ドメインコントローラにパッチ適用を」 https://t.co/CAqRXZM9Sd #Qiita https://qiita.com/kodamap/items/436f7bc84a66b6267feefwarashi
2020-09-29 00:30:02脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 | トレンドマイクロ セキュリティブログ - https://t.co/VDWHAcosBS https://go.shr.lc/2Ghs94gorange_hogehoge
2020-09-29 00:20:04ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/erU9wlzuKS https://piyolog.hatenadiary.jp/entry/2020/09/28/124522se_kenchan
2020-09-29 00:20:03IVが常に0とは...... ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/TSUVMn1f8A https://piyolog.hatenadiary.jp/entry/2020/09/28/124522diffshare
2020-09-29 00:00:04@scanner303 @MSFT365Status Microsoft patched CVE-2020-1472 and is getting a reboot loop 😂MattFromTech
2020-09-28 23:40:05ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/T82mhPspdP うひ https://piyolog.hatenadiary.jp/entry/2020/09/28/124522alicia_v_ff14
2020-09-28 23:40:04ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた piyolog  https://t.co/8RDQWg4iy5 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522tic02_merc
2020-09-28 23:30:04ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた 【piyolog】 https://t.co/dhvFyoqMmx https://piyolog.hatenadiary.jp/entry/2020/09/28/124522euramasahide
2020-09-28 23:10:09ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/qPd7aGwi2t https://piyolog.hatenadiary.jp/entry/2020/09/28/124522Syynya
2020-09-28 22:10:12Updateしましょう / 他15件のコメント https://t.co/nQ04HAFKV4 “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog… https://t.co/SGKwj4nKO0 https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://twitter.com/i/web/status/1310701894344474625ebi
2020-09-28 21:50:20We have updated the KB article for CVE-2020-1472 to provide clarity on customers actions to ensure they are protect… https://t.co/VHNeJm0rhx https://twitter.com/i/web/status/1310696823275782144eyeTSystems
2020-09-28 21:40:06#MSRC CVE-2020-1472 https://t.co/8omjTy7RUo https://twitter.com/msftsecresponse/status/1310686260126789634n_silva
2020-09-28 21:10:35We have updated the KB article for CVE-2020-1472 to provide clarity on customers actions to ensure they are protect… https://t.co/WguEoHvWkD https://twitter.com/i/web/status/1310686260126789634msftsecresponse
2020-09-28 21:00:22“ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/qPJHZovS6X https://htn.to/3CcRy3FpGttmhwq
2020-09-28 20:40:07“ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/GYAEzM4aWL https://htn.to/2yi4AJmLGFwasaist
2020-09-28 19:20:04A different way of abusing Zerologon (CVE-2020-1472) https://t.co/I2NlOwsNn2 https://t.co/Csa4UNkKc6 http://newsbythehour.org/cybr http://bit.ly/3n01Lgueverythingcybr
2020-09-28 19:10:10A different way of abusing Zerologon (CVE-2020-1472) (via @_dirkjan) https://t.co/7NtN6182sX https://t.co/lSYgXof4Oe https://dirkjanm.io/a-different-way-of-abusing-zerologon/ZeroLogon
2020-09-28 19:10:0515件のコメント https://t.co/rpmzNvhG5K “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” (142 users) https://t.co/uVMxUXOOJk https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/2SYwh1gWahtkak
2020-09-28 19:10:03Zerologon: instantly become Windows Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) : 10/10 CVSSv3… https://t.co/xv3EyLExcr https://twitter.com/i/web/status/1310657783134552064lcheylus
2020-09-28 18:41:0515件のコメント https://t.co/WNtciEI56e “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/B5jICpFkCR https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/6R7bZ6HE52mizchi
2020-09-28 18:30:58CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-28 18:30:31ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog2020年8月に修正された脆弱性 CVE-2020-1472はドメインコントローラーが使用するNe… https://t.co/3KLoQdVLfW https://twitter.com/i/web/status/1310647009087496192yobata_tw
2020-09-28 18:20:14Hackers Scanning for Unpatched Domain Controllers Vulnerable to CVE-2020-1472 https://t.co/JcfTFGTdmx https://www.itsecuritynews.info/hackers-scanning-for-unpatched-domain-controllers-vulnerable-to-cve-2020-1472/IT_securitynews
2020-09-28 18:00:14A different way of abusing Zerologon (CVE-2020-1472) https://t.co/nsb8YlenTu #Zerologon https://dirkjanm.io/a-different-way-of-abusing-zerologon/axcheron
2020-09-28 18:00:08Take a moment to read this great article: Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/DAbo5WnADU http://dlvr.it/RhXGSjinfomgmttoday
2020-09-28 16:10:05400 hospitals across the US and UK, looks like #ryuk & #Zerologon CVE-2020-1472 #cyberthreats #patch… https://t.co/XUxNTUJIkd https://twitter.com/i/web/status/1310610848675659782zourick
2020-09-28 15:40:09"Zer0dump is an #POC #exploit / #tool for abusing the #vulnerabilities associated with CVE-2020-1472 (Zerologon) in… https://t.co/R8E44RbT3L https://twitter.com/i/web/status/1310603819961606144levigundert
2020-09-28 15:20:07#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/NnfR1bqyNn https://twitter.com/i/web/status/1310597883490598913deepwatch_sec
2020-09-28 15:10:06自宅のsambaも確認しとく。 / 他14件のコメント https://t.co/XgGb4lDxon “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piy… https://t.co/QHp43SD5QK https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://twitter.com/i/web/status/1310595375091253249mjtw
2020-09-28 15:10:04ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/XR0iSqxsYN https://piyolog.hatenadiary.jp/entry/2020/09/28/124522upsetgo
2020-09-28 14:59:02La #vulnérabilité CVE-2020-1472 surnommée #Zerologon permettant à un #pirate de prendre le contrôle d'un #domaine… https://t.co/siqCzmwi3E https://twitter.com/i/web/status/1310230920192983040PatriceLopez83
2020-09-28 14:50:06ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた https://t.co/YYX8PVTR8j https://piyolog.hatenadiary.jp/entry/2020/09/28/124522kirimemo
2020-09-28 14:50:05ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/mKaFhYT5X4 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522sigeharucom
2020-09-28 14:40:06New post from https://t.co/uXvPWJy6tj (CVE-2020-1472 (directory_server, fedora, leap, samba, ubuntu_linux, windows_… https://t.co/5rOIZ85mfZ http://www.sesin.at https://twitter.com/i/web/status/1310588846707478528WolfgangSesin
2020-09-28 14:40:04はあああああ!? / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/EufrezGox6 https://htn.to/Wf2ziNhWWRglassofleng
2020-09-28 14:30:04piyokango さんの説明 / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/nhfw8TukWg https://htn.to/3Rmsyu9ooQmodokey
2020-09-28 14:10:03ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog "ネットワーク内に攻撃者により侵害された端末が存在する場合、ドメイン管理者の権限が取得される恐… https://t.co/7RszRlMASR https://twitter.com/i/web/status/1310582534158209028moneymog
2020-09-28 14:10:03A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/7rsz7oVh2m https://twitter.com/i/web/status/1310582469989740546camillacurrin
2020-09-28 13:20:13@ZephrFish is it me or anyone else struggling to get clear text traffic for CVE-2020-1472 PoC that shows microsoft… https://t.co/901djVHK4A https://twitter.com/i/web/status/1310568091969941504pwn_the_world
2020-09-28 13:20:07げんなり / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/VsdKgSe4aw https://htn.to/3BVxCp6So9launcher_test
2020-09-28 13:10:08ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/13kK3pWwVL https://piyolog.hatenadiary.jp/entry/2020/09/28/124522topic_tw
2020-09-28 13:00:40Comment identifier et neutraliser la vulnérabilité CVE-2020-1472 / ZeroLogon ? #cybersécurité #infosec #netlogon https://t.co/IToT63Bw5G https://cyberwatch.fr/actualites/comment-identifier-et-neutraliser-la-vulnerabilite-cve-2020-1472-zerologon-netlogon/cyberwatch
2020-09-28 13:00:19ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog (83 users) https://t.co/O40bryKbur : https://t.co/7K5Stxl39I https://bit.ly/3kUB0YV https://bit.ly/30f0gRThatebu_eandb
2020-09-28 13:00:14【はてブ】 ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/rePhBXE2Yt http://dlvr.it/RhWGwqnews_sokuhou
2020-09-28 12:50:31ドメインコントローラーの脆弱性放置はヤバい / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/gs8KJKSlKE https://htn.to/GM3FH5YAsrigaos
2020-09-28 12:50:08ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/hFVVENWukU https://piyolog.hatenadiary.jp/entry/2020/09/28/124522hatena_bookmark
2020-09-28 12:20:06ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/l9OuB4DDWe https://piyolog.hatenadiary.jp/entry/2020/09/28/124522Hk0910Sec
2020-09-28 12:00:068件のコメント https://t.co/EhK4x4DLde “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” (72 users) https://t.co/KsSxb0SOM5 https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/6rnMPHs2AaRyoTa63292153
2020-09-28 11:50:10Microsoft engineers warn - hackers have exploited Zerologon issue (CVE-2020-1472) #Zanket #Zerologon #CVE #vulnerability #CyberSecurityZanket_com
2020-09-28 11:50:058件のコメント https://t.co/p4bbanOcGy “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/QKckvJZlyS https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/Qk4t1yBk8Cminamijoyo
2020-09-28 11:40:06“ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/WhgHnfY7pX #web https://htn.to/415HjtYXSQyujiorama
2020-09-28 11:30:18ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog - https://t.co/pmcsmytTmE https://piyolog.hatenadiary.jp/entry/2020/09/28/124522uwabami
2020-09-28 10:50:08A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/NrWoA6YJBY https://twitter.com/i/web/status/1310531152311132162polo_nmh
2020-09-28 10:40:067件のコメント https://t.co/KSAIzZRlBG “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/ALK7p17Iqd https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/22TNX7jt9Bnapsucks
2020-09-28 10:40:04ひでえ / 他7件のコメント https://t.co/KSAIzZRlBG “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/ALK7p17Iqd https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://htn.to/22TNX7jt9Bnapsucks
2020-09-28 10:30:04IVが固定であってもゼロじゃなければもっとましだったが、ゼロなだけで驚くほど脆弱になる。 / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/h9PMI7FrYS https://htn.to/TVAjGKyDgPrryu2010
2020-09-28 10:20:06Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/1PrjiwSMyA @jpcert https://www.jpcert.or.jp/newsflash/2020091601.htmlkai_ri_0001
2020-09-28 09:40:03“ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/StkyCp0GAk https://htn.to/2BBWYyUX2fnopira
2020-09-28 09:30:05ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/1yjoCMGzTL https://piyolog.hatenadiary.jp/entry/2020/09/28/124522t_erenoa
2020-09-28 09:30:03ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/kHJJJ2cfRj http://dlvr.it/RhVdJshatebusecurity
2020-09-28 09:10:10[B! セキュリティ] ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/P0sN2TZU9w https://b.hatena.ne.jp/entry/s/piyolog.hatenadiary.jp/entry/2020/09/28/124522boss2k
2020-09-28 09:00:49ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/NOuT5dKOt7 #security https://piyolog.hatenadiary.jp/entry/2020/09/28/124522G76whizkidz
2020-09-28 08:40:14ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/65BPqjh3i1 https://ift.tt/2S3UpKxnerubesa
2020-09-28 08:40:07IVヌルクリアとか久しぶりに初歩的なのきたな / 他5件のコメント https://t.co/4FFc299DNJ “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた… https://t.co/0eGkxHHHl8 https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2020%2F09%2F28%2F124522&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3 https://twitter.com/i/web/status/1310498900059414528eru016
2020-09-28 08:10:35Apelidada de “Zerologon”, a brecha especificada como CVE-2020-1472 é um bug crítico de elevação de privilégio que a… https://t.co/DKkZPFi2PJ https://twitter.com/i/web/status/1310490455050727424PhishX
2020-09-28 08:10:29“Recomendamos fortemente que os clientes apliquem imediatamente as atualizações de segurança para CVE-2020-1472. Os… https://t.co/PT4nMo8yob https://twitter.com/i/web/status/1310490457055559682PhishX
2020-09-28 08:00:35How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 < in case you haven’… https://t.co/QiSv7PvvWa https://twitter.com/i/web/status/1310488028603805697ateixei
2020-09-28 08:00:25ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/ALUubvJJS0 https://ift.tt/2S3UpKxmagiauk
2020-09-28 07:50:07これ、結構ヤバい気が。 / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/9gUnRGwtVn https://htn.to/43Bc7HZv2bch1248
2020-09-28 07:20:40#Detecting and Preventing Exploitation of Critical ZeroLogon Windows Server Vulnerability (CVE-2020-1472)… https://t.co/uBwm265aDk https://twitter.com/i/web/status/1310476976835174403sirajs0l
2020-09-28 07:20:15ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog - https://t.co/2tMHxDm848 https://piyolog.hatenadiary.jp/entry/2020/09/28/124522orenoshio
2020-09-28 07:20:06ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた https://t.co/ALUubvJJS0 https://ift.tt/2S3UpKxmagiauk
2020-09-28 06:40:05ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/SuQJN080zC Windows Server、Sambaが影響を受ける https://piyolog.hatenadiary.jp/entry/2020/09/28/124522Stocker_jp
2020-09-28 06:20:18ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/rTkI2pVZ6C https://piyolog.hatenadiary.jp/entry/2020/09/28/124522it_hatebu
2020-09-28 05:50:12この辺が痛い…『Zerologonに対応したMimikatzが公開された』:ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/fU8dFp2aPB https://itnews.org/news_resources/221155tamosan
2020-09-28 05:30:13ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/pxOu3vHZbc https://piyolog.hatenadiary.jp/entry/2020/09/28/124522tethys_seesaa
2020-09-28 05:20:15ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/VAbANIcw7a ”9月11日に技術情報と実証コードが公開され、… https://t.co/63yqfCyfer https://piyolog.hatenadiary.jp/entry/2020/09/28/124522 https://twitter.com/i/web/status/1310447949629984768catnap707
2020-09-28 05:20:10ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/yQoRwWKmSv https://piyolog.hatenadiary.jp/entry/2020/09/28/124522_su_dev
2020-09-28 05:20:09“ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/5PDnIzDY1X https://htn.to/ufUURyvkudyuumediatown
2020-09-28 05:20:07ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/SwaGT0fkKB https://piyolog.hatenadiary.jp/entry/2020/09/28/124522ragemax
2020-09-28 05:10:14本件悪用始まっている模様。入られてからのインパクトが大きいので要対処。 / “ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog” https://t.co/yVPuuI4n9i https://htn.to/38vdYiPS1ktetsutalow
2020-09-28 05:00:07ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/cmbZoBhSqw https://piyolog.hatenadiary.jp/entry/2020/09/28/124522taku888infinity
2020-09-28 04:10:09ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/5P4XrTtVhb https://piyolog.hatenadiary.jp/entry/2020/09/28/124522ohhara_shiojiri
2020-09-28 04:00:27ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/cuIvPXNLvS https://piyolog.hatenadiary.jp/entry/2020/09/28/124522Horita_JAIC
2020-09-28 03:50:32はてなブログに投稿しました #はてなブログ ドメインコントローラーがのっとられる脆弱性 Zerologon(CVE-2020-1472)についてまとめてみた - piyolog https://t.co/RYwDaMzcBs https://piyolog.hatenadiary.jp/entry/2020/09/28/124522piyokango
2020-09-28 02:20:06CVE-2020-1472 これ当てて問題出た事例ない?maccha1030
2020-09-27 22:20:03Microsoft, Windows Server ailesinde bulunan Zerologon (CVE-2020-1472) zafiyetinin, hackerlar tarafından sömürülmeye… https://t.co/McVx42LGHp https://twitter.com/i/web/status/1310341101597982720hackpressorg
2020-09-27 22:00:06A different way of abusing Zerologon (CVE-2020-1472) (via @_dirkjan) https://t.co/acwd7LJpCR https://t.co/6xBgzTBnkW https://dirkjanm.io/a-different-way-of-abusing-zerologon/campuscodi
2020-09-27 18:30:37CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-27 16:10:08A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/YaoHFJogn7 https://twitter.com/i/web/status/1310247901575229440Kasperskybrasil
2020-09-27 15:10:09脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 - https://t.co/IXV8ssfpnL https://go.shr.lc/2Ghs94gHk0910Sec
2020-09-27 13:22:20【ドメインコントローラーを脅かす脆弱性「Zerologon」】 ・CVE-2020-1472 →クライアントコンピューターになりすましてドメインコントローラー(ネットワーク全体を制御しADを実行するサーバー)のパスワードを変更、ド… https://t.co/vk2oKPGjy0 https://twitter.com/i/web/status/1310205673569792001HAL_CSIRT
2020-09-27 11:10:17#Samba addresses the CVE-2020-1472 #Zerologon Vulnerability https://t.co/U9LaYU8r79 #securityaffairs #hacking #linux https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.htmlsecurityaffairs
2020-09-27 09:40:07C'est reparti ... #CVE-2020-1472 https://t.co/7XgDBdJxgi https://twitter.com/MsftSecIntel/status/1308941504707063808thierrym
2020-09-27 08:30:09“脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 | トレンドマイクロ セキュリティブログ” https://t.co/MZv2THPBHQ https://htn.to/2u5VScYRTzlabunix
2020-09-27 07:30:09The @Zerologon attack is based on the exploitation of the privilege escalation #vulnerability, CVE-2020-1472, which… https://t.co/yEo5uLGiZh https://twitter.com/i/web/status/1310119328079966208hackxsecurity
2020-09-27 07:20:32#Detecting and Preventing Exploitation of Critical ZeroLogon Windows Server Vulnerability (CVE-2020-1472)… https://t.co/hKTY4y8wlL https://twitter.com/i/web/status/1310114796059217920sirajs0l
2020-09-27 06:50:09From CERT: Samba Releases Security Update for CVE-2020-1472 #jokesiniaes
2020-09-27 05:50:11脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 | トレンドマイクロ セキュリティブログ https://t.co/6f6VFzrWJi https://blog.trendmicro.co.jp/archives/26206ohhara_shiojiri
2020-09-27 04:50:15CVE-2020-1472, or #Zerologon, is a great example of the value of virtual patching featured in our products.… https://t.co/lPpvpOsZWt https://twitter.com/i/web/status/1310077203149983744trendmicro_mea
2020-09-27 03:20:06脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 - https://t.co/Qt9gXOKWJL https://blog.trendmicro.co.jp/archives/26206ka0com
2020-09-27 03:20:04A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/cA6KJEl4mY https://twitter.com/i/web/status/1310056550799749120trendmicro_john
2020-09-27 01:00:06“脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 | トレンドマイクロ セキュリティブログ” (2 users) https://t.co/mgX9nohJZY https://htn.to/kUEA69NX7hmatsuu_zatsu
2020-09-27 00:50:04From our content community: CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Wi… https://t.co/h8xzYYPtaW https://twitter.com/i/web/status/1310016324731416576CTOUniverse
2020-09-26 23:50:06脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 - トレンドマイクロ セキュリティブログ https://t.co/Su781N0Boz https://go.shr.lc/2Ghs94gspread_jp
2020-09-26 22:20:06#Netlogon EoP vulnerability (CVE-2020-1472) can be exploited in matter of seconds. Security issue impacts Windows S… https://t.co/AM4z8aYCis https://twitter.com/i/web/status/1309979968374534144edgytimes
2020-09-26 20:50:03#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/CPVsDkdWwI https://twitter.com/i/web/status/1309957936513458177deepwatch_sec
2020-09-26 20:20:04脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 https://t.co/gmDQvi1YLK https://t.co/NySeaPRKKx https://blog.trendmicro.co.jp/archives/26206Panda_Lv0
2020-09-26 19:50:03脆弱性「Zerologon」(「CVE-2020-1472」)と行うべき対策 https://t.co/8V35vKySJe #TrendMicro https://ift.tt/3jcNAm0G3fu1
2020-09-26 18:30:10CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-26 17:50:05If you haven't patched your AD Domain Controllers for CVE-2020-1472 - you are running out of time https://t.co/Qz25xPlJL9 https://twitter.com/gossithedog/status/1309901911869587463aprilmardock
2020-09-26 17:10:04I have detected in the wild exploitation of CVE-2020-1472, aka ZeroLogon, in my honeypot. This is an escalation in… https://t.co/7QK9EE4Ec9 https://twitter.com/i/web/status/1309901911869587463GossiTheDog
2020-09-26 16:30:07okay, the honeypot has detected in the wild, spray and pray exploitation of CVE-2020-1472 over the internet. blog coming up.GossiTheDog
2020-09-26 16:14:43CVE-2020-1472 interfacing with your domain controller https://t.co/9cHeWpIgzx https://twitter.com/ddoniolvalcroze/status/1309523983260237824dirtywhitehat
2020-09-26 14:10:04ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/RiQhOTTAVH https://blog.zsec.uk/zerologon-attacking-defending/AlexaChenowith
2020-09-26 08:20:03🔴MICROSOFT🔴 Múltiples vulnerabilidades de severidad alta en productos MICROSOFT: CVE-2020-1597,CVE-2020-1472 Más… https://t.co/19qVeKovIM https://twitter.com/i/web/status/1309769639707242496GrupoICA_Ciber
2020-09-26 07:40:08Great artical about diffrent way to do attacks with Zerologon (CVE-2020-1472) #hack #redteam #cve #hackers https://t.co/dC3BFbkOzi https://dirkjanm.io/a-different-way-of-abusing-zerologon/RogerBergling
2020-09-26 07:00:04New post: Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 – Kashif Ali https://t.co/RjpSFEunJc https://reportcybercrime.com/unpatched-domain-controllers-remain-vulnerable-to-netlogon-vulnerability-cve-2020-1472-kashif-ali/digitpol_cyber
2020-09-26 00:20:02Due to the severe nature of CVE-2020-1472, @CrowdStrike has developed a custom Zerologon dashboard to determine if… https://t.co/oPxfL7kQ0S https://twitter.com/i/web/status/1309646756049813505skovsky
2020-09-25 23:50:02A different way of abusing Zerologon (CVE-2020-1472) https://t.co/Y8OpMm86yw https://dirkjanm.io/a-different-way-of-abusing-zerologon/ch3tanK
2020-09-25 23:40:03ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/C3Jzit5w1U https://blog.zsec.uk/zerologon-attacking-defending/ch3tanK
2020-09-25 22:10:07A different way of abusing Zerologon (#CVE-2020-1472) https://t.co/RUkkR1d283 https://dirkjanm.io/a-different-way-of-abusing-zerologon/WilfridBlanc
2020-09-25 22:10:05Microsoft warns of active exploits in the wild of Zerologon vulnerability CVE-2020-1472 (update)… https://t.co/LsDI7mlCOr https://twitter.com/i/web/status/1309613797976559619securezoo
2020-09-25 22:00:13「Netlogon Remoteプロトコル(MS-NRPC)」の実装において、別名「Zerologon」と呼ばれる脆弱性「CVE-2020-1472」が明らかとなった問題で、脆弱性の悪用が確認。米政府やマイクロソフトでは悪用を確認… https://t.co/YQOiYR7meX https://twitter.com/i/web/status/1309612274185916421ismsecuritynews
2020-09-25 21:40:06A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/0UJ4jtmLQ5 https://t.co/tYqSnRBhb3 http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/UnctusM
2020-09-25 21:40:05Mimikatz CVE-2020-1472 Zerologon rule for Snort/Suricata https://t.co/Z5ZwIa0YQA #cyber #threathunting #infosec https://t.co/go5oGq2udK http://dlvr.it/RhMgqZblueteamsec1
2020-09-25 20:50:03Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/sBxQ5CESVO #uscert #gov https://buff.ly/3ct4ERTNotTruppi
2020-09-25 18:30:07CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-25 18:10:04Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 #Anonymous https://t.co/7I2J837KpM https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472AnonAnonymous
2020-09-25 17:50:15Microsoft released security patches for vulnerability CVE-2020-1472, also dubbed “Zerologon,” to be deployed on AD,… https://t.co/B8WhXUxfoK https://twitter.com/i/web/status/1309543806715547655SankalpITteam
2020-09-25 17:30:07Microsoft released security patches for vulnerability CVE-2020-1472, also dubbed “Zerologon,” to be deployed on AD,… https://t.co/F81gXCFDC7 https://twitter.com/i/web/status/1309543649626202114prag95750323
2020-09-25 17:30:03#CVE-2020-1472 #ZeroLogon Alert: ‘Critical’ Windows Vulnerability Needs Your Attention. The @Keysight_ATI team put… https://t.co/s44FzGhk5m https://twitter.com/i/web/status/1309545703014834182IXIAcom
2020-09-25 17:20:05A different way of abusing #Zerologon (CVE-2020-1472) https://t.co/GjWEOqrisS https://dirkjanm.io/a-different-way-of-abusing-zerologon/domineefh
2020-09-25 17:10:07A different way of abusing Zerologon (CVE-2020-1472): https://t.co/CSqdVYBSgQ #zerologon #cve #security https://t.co/iwVtpwLjbZ https://dirkjanm.io/a-different-way-of-abusing-zerologon/blackstormsecbr
2020-09-25 17:10:06If you are worried about CVE-2020-1472, here is the link to Microsoft NetLogon recommendations https://t.co/HWC1D1BCWB https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocsantosomar
2020-09-25 16:50:09CVE-2020-1472 https://t.co/XeSPgcLm43 https://www.zdnet.com/article/microsoft-says-it-detected-active-attacks-leveraging-zerologon-vulnerability/CVEannounce
2020-09-25 16:10:04Se dio a conocer la explotación de la vulnerabilidad CVE-2020-1472, #Zerologon. Esta escala privilegios debido al u… https://t.co/wkIBcml1ef https://twitter.com/i/web/status/1309524376455446536EcuCERT_EC
2020-09-25 15:50:10As @gcluley astutely writes: If your business runs Windows Server, patch the Zerologon vuln - CVE-2020-1472.… https://t.co/FqyUkg5K6i https://twitter.com/i/web/status/1309518850354970625benrothke
2020-09-25 15:30:04Learn more about Zerologon, CVE-2020-1472. https://t.co/TrD07b2aia https://t.co/hSvnNgdACE http://ow.ly/xdNr50BBllz https://www.nopsec.com/just-in-time-bulletin-zerologon/nopsec
2020-09-25 15:10:05A different way of abusing #ZeroLogon (CVE-2020-1472) Using the Printer Bug with zerologon to relay to DSRUAPI and… https://t.co/Ahgat2ZRzz https://twitter.com/i/web/status/1309507973950181376GroupHackathon
2020-09-25 14:50:16"A different way of abusing Zerologon (CVE-2020-1472)" https://t.co/X1iuOP7Sqp https://dirkjanm.io/a-different-way-of-abusing-zerologon/andy_one
2020-09-25 14:50:04A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/83ZpGExHU7 https://t.co/uxPhZ9gVHx http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/n0ipr0cs
2020-09-25 14:30:06マイクロソフトはCVE-2020-1472 vulnerability, aka ZeroLogonに対する攻撃を確認。認証回避と権限昇格が可能でdomainのadministrator権限の取得が可能。今直ぐパッチを当てろ! https://t.co/st95bCLCnl https://twitter.com/TheRegister/status/1309260763375296513jingbay
2020-09-25 14:10:05Aktuelles zur Zerologon-Sicherheitslücke (CVE-2020-1472) https://t.co/TSKZMh3SPh https://cert.at/de/aktuelles/2020/9/neues-zur-zerologon-sicherheitslucke-cve-2020-1472CERT_at
2020-09-25 14:10:03A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/e7fy5GTGMQ https://twitter.com/i/web/status/1309494819744632833TrendMicroUK
2020-09-25 14:00:06What is #zerologon - find out at #trendmicro #vulnerabilities #cybersecurity #infosec MS-NRPC CVE-2020-1472 https://t.co/5s3wuoXr9A https://lnkd.in/dB2JPQXvesajoki
2020-09-25 14:00:03Zerologon (CVE-2020-1472) privilege elevation vulnerability is actively being exploited. Patch your Windows boxes.Pfirstbrook
2020-09-25 13:30:05"به‌روزرسانی SAMBA و رفع آسیب‌پذیری CVE-2020-1472" https://t.co/mwVizeUt3a https://ift.tt/2S0rqaAICTna
2020-09-25 13:30:03Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/Ph4j2aJPME https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogonSecureNetIT
2020-09-25 12:50:05New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/SldmM67jIs https://lnkd.in/dxtmYhVggclass
2020-09-25 12:40:06#Security readings: A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/XFAT1baKCd… https://t.co/WNfFwk9NlE http://dirkjanm.io https://twitter.com/i/web/status/1309471115954315264LinuxSec
2020-09-25 12:10:04A different way of abusing Zerologon (CVE-2020-1472) – https://t.co/CiBqd3cuSw https://t.co/jgFv7FUsxL http://dirkjanm.io https://aeternusmalus.wordpress.com/2020/09/25/a-different-way-of-abusing-zerologon-cve-2020-1472-dirkjanm-io/DoggoJoshu
2020-09-25 12:00:07Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerabilit… https://t.co/Pw5aeLXNFF https://twitter.com/i/web/status/1309460678995050496FAllendesF
2020-09-25 12:00:05In August, @Microsoft released #security patches for a critical vulnerability CVE-2020-1472, also dubbed “… https://t.co/EKy6ydAJmE https://twitter.com/i/web/status/1309461401380040704KaseyaCorp
2020-09-25 11:20:06New blog! Detecting the Zerologon Exploitation (CVE-2020-1472) https://t.co/Q4JaChPSdZ https://lnkd.in/ggt3MifSrinivasR2013
2020-09-25 11:10:06ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/rjfDc4OZ4V https://blog.zsec.uk/zerologon-attacking-defending/samilaiho
2020-09-25 10:20:04A different way of abusing Zerologon (CVE-2020-1472) https://t.co/ElkyfFZYGx https://dirkjanm.io/a-different-way-of-abusing-zerologon/Dinosn
2020-09-25 10:20:04CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/TJL9SOQukU via @YouTube 面白かったです、勉強になりました! 動画でも言われてるけど、めっちゃCTFで出そうな脆弱性だな https://youtu.be/1h_wlMWwyB400000a24
2020-09-25 10:10:08A different way of abusing Zerologon (CVE-2020-1472) https://t.co/N5lN6iUskT https://dirkjanm.io/a-different-way-of-abusing-zerologon/AlexaChenowith
2020-09-25 10:00:04"A different way of abusing Zerologon (CVE-2020-1472)" https://t.co/vSVMxnV4uw https://dirkjanm.io/a-different-way-of-abusing-zerologon/_hg8_
2020-09-25 09:10:08ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/tMMpSXPs98 https://blog.zsec.uk/zerologon-attacking-defending/I_am_cjc
2020-09-25 09:10:08A different way of abusing #Zerologon (CVE-2020-1472) https://t.co/gMDDBKE7Sc https://dirkjanm.io/a-different-way-of-abusing-zerologon/Anastasis_King
2020-09-25 08:30:06so microsoft still not update their page Security Update Guide > Details CVE-2020-1472 | Netlogon Elevation of Priv… https://t.co/sh7Pg5ufmE https://twitter.com/i/web/status/1309407326265171969snowdarkz
2020-09-25 08:30:05Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/1D2sNtqqLQ @jpcert ”マイクロソフト (Microsoft Security Intellige… https://t.co/PyI5wODcSZ https://www.jpcert.or.jp/newsflash/2020091601.html https://twitter.com/i/web/status/1309408467434704896catnap707
2020-09-25 08:20:06A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/U4AP1y43iO https://t.co/jefWcYlK0B http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ohhara_shiojiri
2020-09-25 08:20:04A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/r0rzvLW4V3 https://twitter.com/i/web/status/1309406761749708801jkrogsboll
2020-09-25 08:00:03Microsoft says it detected active attacks leveraging Zerologon vulnerability (CVE-2020-1472) via @ZDNet #Proficio… https://t.co/xi0RPgCeGF https://twitter.com/i/web/status/1309402260691009538proficioinc
2020-09-25 07:50:04ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/AzwrsNayYl https://blog.zsec.uk/zerologon-attacking-defending/Dan_Suciu
2020-09-25 07:30:05⚠️ #PATCH ⚠️ Les CERT français & allemand ont tous deux republiés l’URGENCE de corriger la faille CVE-2020-1472… https://t.co/cnuL8AwmxC https://twitter.com/i/web/status/1309392390600491011FabianRODES
2020-09-25 07:10:06Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 Original release date: Sept… https://t.co/Fyq3q5bYWB https://twitter.com/i/web/status/1309387736009314304threatmeter
2020-09-25 07:10:04Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/URPFf5FiWY https://ift.tt/340kaRHcyberbuzznews
2020-09-25 06:40:07Microsoft Lacak Aktor Dibalik Zerologon CVE-2020-1472 https://t.co/tgIwAZeUjK https://www.nesabamedia.com/microsoft-lacak-aktor-dibalik-zerologon-cve-2020-1472/BlogNesabaMedia
2020-09-25 06:20:06IT Notfalleinsatz seit gestern 19:30 mit 1 Stunde Schlaf Unterbrechung. Danke M$ für CVE-2020-1472 🤬🖕rasgultam
2020-09-25 06:10:17Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/KEbYYELUxs… https://t.co/SJ6nRvvTLf https://bit.ly/36iWZVx https://twitter.com/i/web/status/1309372353072304128cyberdian_cert
2020-09-25 06:00:06Top story: A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/bAS0MuEN03 https://t.co/D3m0yG7DBX,… https://t.co/YVkcWLydWN http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ https://twitter.com/i/web/status/1309371928394764288r45c4l
2020-09-25 06:00:05If you have not patched CVE-2020-1472 (#Zerologon) yet, do it NOW! #InfoSec https://t.co/9qQ60tRTWF https://twitter.com/MsftSecIntel/status/1308941504707063808sattlert
2020-09-25 05:50:05更新: 2020年9月25日 > Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/dcCxZJkP6i https://www.jpcert.or.jp/newsflash/2020091601.htmlohhara_shiojiri
2020-09-25 05:50:05A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/3mCvxXqdU5 https://t.co/DCOsXl67mn http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/PVynckier
2020-09-25 05:20:06CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」を更新。本脆弱性を悪用した攻撃が確認されています。マイクロソフトが提供する情報を参考に、早急に対策の実施をご検… https://t.co/eyt6lyWrmV https://twitter.com/i/web/status/1309360695247421440jpcert
2020-09-25 04:50:23A different way of abusing Zerologon, tracked as CVE-2020-1472. This is an authentication bypass vulnerability in t… https://t.co/QpsfFThzTf https://twitter.com/i/web/status/1309351626994593792kot_hacker
2020-09-25 04:00:05すみません...今更CVE-2020-1472(zerologon)について知りました...グヘェt0kapo
2020-09-25 03:30:04Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/W4edRPWFHL https://bit.ly/3mSDcC7kuhn_on_kash
2020-09-25 03:20:04CISAが、Netlogon脆弱性 CVE-2020-1472についてのきじをりりーすした。 その中で、パッチが適用されていないドメインコントローラを検出する パッチ検証スクリプト をリリースした起債がある。 念のため、検証スク… https://t.co/9rdqPYOVSt https://twitter.com/i/web/status/1309331488547069953hogehuga
2020-09-25 03:20:04CVE-2020-1472 earned #Microsoft’s most-dire “critical” severity rating, meaning attackers can exploit it with littl… https://t.co/WlQPlLAhT9 https://twitter.com/i/web/status/1309330543692197896cjkonrad
2020-09-25 02:50:04Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/zMnwQ1RnXJ https://j.mp/3kRb9kJPatrickCMiller
2020-09-25 02:30:04#Microsoft sounds alarm over active attacks using exploits for the CVE-2020-1472 #Netlogon #EoP vulnerability, dubb… https://t.co/P1kFgWl4mh https://twitter.com/i/web/status/1309318044100046855dpvora
2020-09-25 02:00:04Microsoft Says Hackers Actively Targeting Zerologon Vulnerability (CVE-2020-1472) https://t.co/GctAksglnE https://www.securityweek.com/microsoft-says-hackers-actively-targeting-zerologon-vulnerabilitySecurityWeek
2020-09-25 01:00:08A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/2uvdkmodaN - https://t.co/ambQXCeP8o http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/moton
2020-09-25 00:40:06https://t.co/Fd11rq48vW A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/28VjlQsmia https://dirkjanm.io/a-different-way-of-abusing-zerologon/ http://dirkjanm.io1nf0s3cpt
2020-09-25 00:40:05#Cybersecurity #InfoSec A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/9UVEMTNyfR… https://t.co/bQ6mKO6uHL http://dirkjanm.io https://twitter.com/i/web/status/1309289673865547777SritaKaren
2020-09-25 00:30:05Top story: A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/GCmXcXOVeq https://t.co/imtuHI7c72,… https://t.co/c3u75ODflU http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/ https://twitter.com/i/web/status/1309286597804920832DLsec101
2020-09-24 23:50:13A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/azYthNk07h https://t.co/q8VQI1Jbwo http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/tais9
2020-09-24 23:50:13A different way of abusing Zerologon (CVE-2020-1472) https://t.co/XKqGAGXigB #appsec #security #secops https://ift.tt/3mLFhzLrtcz_io
2020-09-24 23:40:10A different way of abusing Zerologon (CVE-2020-1472) https://t.co/99wkFjR7TN http://hrbt.us/213436hardreboot
2020-09-24 23:30:04Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 - https://t.co/ybW83hbewX https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogonmoton
2020-09-24 23:20:05Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 - https://t.co/O5YnH1ZSx9 https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogonka0com
2020-09-24 23:00:07New post: "A different way of abusing Zerologon (CVE-2020-1472)" https://t.co/PDtkHpSaYl https://ift.tt/33XQZylMyinfosecfeed
2020-09-24 22:30:04A different way of abusing Zerologon (CVE-2020-1472) #netsec #security #tech #cybersecurity https://t.co/zv2VTQKI11 https://ift.tt/3mLFhzL_drewlong
2020-09-24 22:20:07A different way of abusing Zerologon (CVE-2020-1472) https://t.co/O4y9wsch0o https://dirkjanm.io/a-different-way-of-abusing-zerologon/_r_netsec
2020-09-24 22:10:14ZeroLogon(#CVE-2020-1472) - Attacking & Defending https://t.co/ofLjBSBrQb https://blog.zsec.uk/zerologon-attacking-defending/WilfridBlanc
2020-09-24 22:10:13Check out the latest news as of Sep 25 featuring “A different way of abusing Zerologon (CVE-2020-1472)” https://t.co/seLZ3TFzcX https://nzzl.us/NT0UkRVNewsinIT
2020-09-24 22:10:06A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/RJW0oCEw9b https://twitter.com/i/web/status/1309253065783025664HiddenMaces
2020-09-24 21:40:05You’re Going to Want to Patch CVE-2020-1472 (Zerologon) ASAP: CVE-2020-1472, aka “Zerologon,” is making the news th… https://t.co/ySLOvJRiku https://twitter.com/i/web/status/1309244611445964800cipherstorm
2020-09-24 21:40:04ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/KA8iKwsb1O https://blog.zsec.uk/zerologon-attacking-defending/n0ipr0cs
2020-09-24 21:40:03A different way of abusing Zerologon (CVE-2020-1472) - https://t.co/NDbM4PKgNX https://t.co/VWwRlVEsMG http://dirkjanm.io https://dirkjanm.io/a-different-way-of-abusing-zerologon/opexxx
2020-09-24 21:20:08Zerologon : Microsoft signale des attaques https://t.co/xGpYH0TwDx via @zdnetfr CVE-2020-1472 https://www.zdnet.fr/actualites/zerologon-microsoft-signale-des-attaques-39910177.htmargevise
2020-09-24 21:20:04Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/4H3o9wtZO5 http://dlvr.it/RhHvpCamolsarwate
2020-09-24 21:10:09El CVE-2020-1472 de vulnerabilidad crítica apodado Zerologon, podría permitir a los atacantes remotos establecer un… https://t.co/GnKmrUcwdg https://twitter.com/i/web/status/1309237445444218880BackTrackAcadem
2020-09-24 21:00:08A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/DqoV2YQ6CF https://twitter.com/i/web/status/1309234679233609728radiceu
2020-09-24 21:00:07#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/5Fxm4DQflS https://twitter.com/i/web/status/1309234775316746242deepwatch_sec
2020-09-24 20:40:05A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon,may allow an attack… https://t.co/xkvUeFpXlr https://twitter.com/i/web/status/1309228960337846283TracyShouldice
2020-09-24 20:30:03It is pretty humbling 🙇‍♂️and awesome 👏 to see our teams work 🛡on Zerologon (CVE-2020-1472) mentioned in the latest… https://t.co/hG4NoHU0q0 https://twitter.com/i/web/status/1309228461651787776d1vious
2020-09-24 20:10:03So, for the CVE-2020-1472 vulnerability (Netlogon), I ran the CMPivot Query : Registry('hklm:\\SYSTEM\\CurrentContr… https://t.co/SsKMbAanpE https://twitter.com/i/web/status/1309223176195510287SCCM_Ryan
2020-09-24 20:00:11Active exploitation of CVE-2020-1472, an elevation of privilege vulnerability in Microsoft’s Netlogon. A remote att… https://t.co/aShwnRDFGg https://twitter.com/i/web/status/1309218576427970560IanBarwise
2020-09-24 20:00:06Microsoft Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472 - Update 1https://cyber.gc.ca/en/alerts/mic… https://t.co/OJZtAFDFhU https://twitter.com/i/web/status/1309220237166997504threatmeter
2020-09-24 19:40:09Some examples of mitigation techniques for #ZeroLogon Vulnerabiliy and A handy walkthrough of CVE-2020-1472 from bo… https://t.co/IHQJpuD3AI https://twitter.com/i/web/status/1309212892193943553CVEandABV
2020-09-24 19:40:06Love how quick people are finding these exploits and CVE'ing them away... CVE-2020-1472 https://t.co/5neh0cJcBR https://twitter.com/_dirkjan/status/1309214379003588608OuttingLiars
2020-09-24 19:30:06Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 | CISA https://t.co/nqrLDSdCVD https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogonRRalstonAgile
2020-09-24 19:30:05ZeroLogon (CVE-2020-1472) testing script https://t.co/hil1oq2NSq https://github.com/SecuraBV/CVE-2020-14723m1l
2020-09-24 19:30:04Zerologon (CVE-2020-1472) | Vulnerabilidad de elevación de privilegios e... https://t.co/yzTh4Nwcud a través de @YouTube https://youtu.be/KKs5kCLbJjAMifmtz
2020-09-24 19:20:10ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/I2NlOwsNn2 https://t.co/fZuhrsteHg http://newsbythehour.org/cybr http://bit.ly/33XhpAeeverythingcybr
2020-09-24 19:20:08[MàJ du 24/09/ 2020] CVE-2020-1472  Microsoft confirme l'exploitation de cette vulnérabilité par des attaquants.… https://t.co/0ofkKcv1Ne https://twitter.com/i/web/status/1309208922016952321argevise
2020-09-24 19:20:07#ITSecurity : ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/jdruBZfHqY https://blog.zsec.uk/zerologon-attacking-defending/GAILLOTPatrice
2020-09-24 19:20:05شرح اكتشاف ثغرة CVE-2020-1472 من خلال استخدام splunk https://t.co/kZk2ruDk5J https://t.co/Rc9GZGQRAH https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.htmlMAlajab
2020-09-24 19:10:16Microsoft warns of active exploits in the wild of Zerologon vulnerability (CVE-2020-1472) https://t.co/6poWP7GGec… https://t.co/LkmpK082f0 https://buff.ly/32XKOuY https://twitter.com/i/web/status/1309205994065596416securezoo
2020-09-24 19:10:15Microsoft warns that the Zerologon vulnerability (CVE-2020-1472) is being exploited in the wild. Urges organisation… https://t.co/4U3AsgG7dY https://twitter.com/i/web/status/1309206818745462789Rom_Duck
2020-09-24 19:00:08Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/83gZRxtEqm #uscert #security https://bit.ly/3kLRwKyATTOGTech
2020-09-24 18:50:03New post: Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/OrkZKUFq7v https://reportcybercrime.com/unpatched-domain-controllers-remain-vulnerable-to-netlogon-vulnerability-cve-2020-1472/digitpol_cyber
2020-09-24 18:40:15Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/MuC11AAbQB #cert #security https://bit.ly/3kLRwKySiciliamConsult
2020-09-24 18:40:15Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472https://us-cert.cisa.gov/nca… https://t.co/JnN53wMK7H https://twitter.com/i/web/status/1309198532860149760gregoryfarley
2020-09-24 18:40:14https://t.co/xfpBlkQfAe ZeroLogon(#CVE-2020-1472) – #Attacking & #Defending http://anonymous.bravehost.com/main/2020/09/24/120959/security/VitalAnon
2020-09-24 18:40:12Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/J3e8M0fUti https://sl.advdat.com/2RXZuEiADVDAT_OH
2020-09-24 18:30:13CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-24 18:30:08Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/cuko2geOWq https://us-cert.cisa.gov/ncas/current-activity/2020/09/24/unpatched-domain-controllers-remain-vulnerable-netlogon?utm_source=dlvr.it&utm_medium=twitterRigneySec
2020-09-24 18:30:06#infosec Unpatched Domain Controllers Remain Vulnerable to Netlogon Vulnerability, CVE-2020-1472 https://t.co/hnx3EgQdoj https://ift.tt/340kaRHjeffreydbrown
2020-09-24 18:00:11Microsoft has detected active attacks leveraging the #Zerologon vulnerability (CVE-2020-1472). Security teams are a… https://t.co/ISTiMhoKJb https://twitter.com/i/web/status/1309188505399169028qualys
2020-09-24 18:00:08The weaponized #Microsoft vulnerability is now being exploited in the wild. CVE-2020-1472. You need to patch for it… https://t.co/kWRR8cl3Pc https://twitter.com/i/web/status/1309189869466537986brycea
2020-09-24 17:50:08CVE-2020-1472 - Zerologon. Apparently there are attacks against this is in the wild, according to some Sherlock Hol… https://t.co/59o2Jfvb6X https://twitter.com/i/web/status/1309187289600360452Seven_Stones
2020-09-24 17:20:07#SMB #Samba addresses the CVE-2020-1472 #Zerologon #Vulnerability #CyberSecurity #infosecurity #Hacking #pentesting https://t.co/kRj68QArpp https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.htmlmisaelban
2020-09-24 17:10:03https://t.co/pAQHh3ec9c #mobile #powerapps #Other #CVE-2020-1472 #microsoft #Scott Caveza #Tenable #Windows Server… https://t.co/71rN4tjwIe https://krebsonsecurity.com/2020/09/microsoft-attackers-exploiting-zerologon-windows-flaw/...#tech https://twitter.com/i/web/status/1309178125134311424DonPistulka
2020-09-24 17:00:19Microsoft strongly recommends to apply security updates for CVE-2020-1472 #Zerologon which has been exploited in th… https://t.co/nwux8oXaYM https://twitter.com/i/web/status/1309173881735962624QatarCERT
2020-09-24 16:50:07Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/eckeMeAnUQ https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.htmlDinosn
2020-09-24 16:10:09A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/HkdWGAlMS1 https://twitter.com/i/web/status/1309160692763840515Kasperskybrasil
2020-09-24 16:10:04Microsoft warns again about getting the Windows Server Netlogon vulnerability (CVE-2020-1472) patched. https://t.co/7MIdC5Uc2n https://twitter.com/MsftSecIntel/status/1308941504707063808kurmac
2020-09-24 16:10:04Microsoft warns that the Zerologon vulnerability (CVE-2020-1472) is being exploited in the wild. Urges organisation… https://t.co/xQpY1dnTuz https://twitter.com/i/web/status/1309162436726005762virusbtn
2020-09-24 16:00:12Blah blah blah CVE-2020-1472 blah blah blah zerologon blah blah blah Kali Linux blah blah blah I made a video. https://t.co/HIc8to27Ey https://www.youtube.com/watch?v=-5KwcOAE-4kDCAU7
2020-09-24 15:10:12#ZeroLogon CVE-2020-1472. If you have your #FortiGates with IPS, the Signature is ready to go. https://t.co/yCHFboLAVY https://lnkd.in/gcFkgbgsardinasa
2020-09-24 15:00:05FYI: While this does specifically for Windows Domains Controllers CVE-2020-1472 also works for Samba acting as a do… https://t.co/lMdLXOcJaP https://twitter.com/i/web/status/1309144130958880769TomLawrenceTech
2020-09-24 15:00:05Vulnérabilité Microsoft Zerologon / Netlogon CVE-2020-1472 activement exploitée —> recommandations des experts… https://t.co/uihnlFjW32 https://twitter.com/i/web/status/1309143859218259968argevise
2020-09-24 14:40:13Die Sicherheitslücke CVE-2020-1472 „Zerologon“ im Netlogon-Protokoll ermöglicht Angreifern die Übernahme von Domäne… https://t.co/LHU1l4dcuZ https://twitter.com/i/web/status/1309138051516555270Kaspersky_DACH
2020-09-24 14:40:12ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/WlXFtcoxDt https://t.co/5yn2MFklmh http://dlvr.it/RhGjbNowaspseattle
2020-09-24 14:40:06Die Sicherheitslücke CVE-2020-1472 „Zerologon“ im Netlogon-Protokoll ermöglicht Angreifern die Übernahme von Domäne… https://t.co/C2bP70Jooh https://twitter.com/i/web/status/1309139616931491840ikommgmbh
2020-09-24 14:20:05Microsoft: Hackers using Zerologon exploits in attacks, patch now! https://t.co/IK29HuInCx ZeroLogon CVE-2020-1472… https://t.co/60NBswiiS9 https://buff.ly/3052Jy6 https://twitter.com/i/web/status/1309134555794857986vtconsultingnet
2020-09-24 14:10:06URGENT: Please patch now! Attackers are actively exploiting CVE-2020-1472 Netlogon EoP vulnerability, dubbed Zerolo… https://t.co/6C6mASujeY https://twitter.com/i/web/status/1309131494657527816reybango
2020-09-24 14:10:05This is also why it's important to patch for ZeroLogon / CVE-2020-1472 Netlogon EoP vulnerability. A full exploit h… https://t.co/sgku9S0m0X https://twitter.com/i/web/status/1309131787596169217reybango
2020-09-24 13:50:05"CVE-2020-1472 is probably going to get weaponized pretty quickly." Our CISO, @phat_hobbit, on the money once again… https://t.co/8rXFTgKxyL https://twitter.com/i/web/status/1309127095617040384Cyjax_Ltd
2020-09-24 13:00:08@Chop24234166 @ashwinpatil @cglyer Azure ATP is “Suspected Netlogon privilege elevation attempt (CVE-2020-1472 expl… https://t.co/H5TQJxpND7 https://twitter.com/i/web/status/1309113565941465088GossiTheDog
2020-09-24 12:50:04If you didn't patch CVE-2020-1472 "the Netlogon Elevation of Privilege Vulnerability", you are really playing with… https://t.co/DWUMdwJh15 https://twitter.com/i/web/status/1309112439649316864circl_lu
2020-09-24 12:40:06https://t.co/oeEowd8e30 CVE-2020-1472 Zerologon Microsoft https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/morimori_nori
2020-09-24 12:40:04Microsoft Says Hackers Actively Targeting Zerologon Vulnerability (CVE-2020-1472) https://t.co/GctAkrYKw6 https://www.securityweek.com/microsoft-says-hackers-actively-targeting-zerologon-vulnerabilitySecurityWeek
2020-09-24 12:30:04CVE-2020-1472 aka Zerologon https://t.co/WwugBwSQyP https://www.netscylla.com/blog/2020/09/23/CVE-2020-1472-Zerologon.html_muno_
2020-09-24 12:20:05An interesting news about "Samba addresses the CVE-2020-1472 Zerologon Vulnerability" at https://t.co/dMdKkYWhny https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerability_Wr0ngName_
2020-09-24 11:50:06CVE-2020-1472 / Zerologon is a great example of the value of virtual patching featured in our products. See why… https://t.co/5fgsKHMX33 https://twitter.com/i/web/status/1309097058511527948trendmicro_mea
2020-09-24 11:40:12CVE-2020-1472 is now being exploited - see the @ncsc_gov_ie advisory at https://t.co/2W0NuoAgD4 https://t.co/cy11BYiQSl https://www.ncsc.gov.ie/pdfs/ZeroLogon_160920.pdf https://twitter.com/MsftSecIntel/status/1308941504707063808ncsc_gov_ie
2020-09-24 11:40:05I wonder if anyone used the "Exploitability Assessment" field for Zerologon CVE-2020-1472 as an excuse for why it d… https://t.co/soFYYO6gQ0 https://twitter.com/i/web/status/1309094984155570178wdormann
2020-09-24 11:30:09[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/uYrcdm81k9 https://t.co/Ngj48FOGgf https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ https://twitter.com/hyougetu18313/status/1309090909599010816hyougetu18313
2020-09-24 11:10:04An interesting blog post on #ZeroLogon CVE-2020-1472 https://t.co/vmbKgfyspN https://blog.zsec.uk/zerologon-attacking-defending/infoshaker
2020-09-24 10:30:11#ZeroLogon(#CVE-2020-1472) - Attacking & Defending https://t.co/zQ6sxYTNMF #CtverAttack vs #CyberDefense… https://t.co/ybSeAq0Sxn https://blog.zsec.uk/zerologon-attacking-defending/ https://twitter.com/i/web/status/1309075385938857985tribal_sec
2020-09-24 10:30:11A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/klgx4rG0ei https://twitter.com/i/web/status/1309075337670778887cesar_candido
2020-09-24 10:10:03My Daily #TopStory: Samba addresses the CVE-2020-1472 Zerologon VulnerabilitySecurity Affairs… https://t.co/a7kmCyo2bO https://twitter.com/i/web/status/1309071945967771649SofiaSZM
2020-09-24 10:00:08Microsoft geeft aan: actief misbruik van de kwetsbaarheid CVE-2020-1472. Mocht u updates nog niet op domaincontroll… https://t.co/c5dSAR79zk https://twitter.com/i/web/status/1309069091852955650ncsc_nl
2020-09-24 09:30:05#DailyHackManac Top story: Samba addresses the CVE-2020-1472 Zerologon VulnerabilitySecurity Affairs… https://t.co/TzfYpF3HnT https://twitter.com/i/web/status/1309061830736740354_hackmanac
2020-09-24 09:30:04Microsoft report active #CVE-2020-1472 Netlogon attacks #ZeroLogon in the wild against AD. Partial fix in the Augus… https://t.co/ybKzLV2mg1 https://twitter.com/i/web/status/1309061922332053511OccamSec
2020-09-24 09:10:09CVE-2020-1472/Zerologon. As an IT manager should I worry? https://t.co/ECMX4q7rUh #bugbounty #bugbounties https://www.pentestpartners.com/security-blog/cve-2020-1472-zerologon-as-an-it-manager-should-i-worry/bugbounty18
2020-09-24 09:10:08Zerologon PoC (CVE-2020-1472) https://t.co/2cP7bQSvSs https://raw.githubusercontent.com/dirkjanm/CVE-2020-1472/master/cve-2020-1472-exploit.pyisseykun
2020-09-24 09:10:05CVE-2020-1472 : ZeroLogon Attacking & Defending Zerologon also known as CVE-2020-1472 affects a cryptographic auth… https://t.co/auM6AlMqxK https://twitter.com/i/web/status/1309056899770441729Anastasis_King
2020-09-24 08:40:05Azure ATP detection is called “Suspected Netlogon privilege elevation attempt (CVE-2020-1472 exploitation)”, will a… https://t.co/RDQUFBo491 https://twitter.com/i/web/status/1309048793183158282GossiTheDog
2020-09-24 08:20:04ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/NaoF7huWhB https://blog.zsec.uk/zerologon-attacking-defending/autumn_good_35
2020-09-24 08:10:07CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/hNlknhSVMk @YouTubeより https://youtu.be/1h_wlMWwyB4mya626
2020-09-24 08:00:05ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/NqY5SIfQqo https://blog.zsec.uk/zerologon-attacking-defending/Dinosn
2020-09-24 07:40:09#ZeroLogon (CVE-2020-1472) Attacking & Defending https://t.co/m6XdAiQyYS https://blog.zsec.uk/zerologon-attacking-defending/ixmailsaygili
2020-09-24 07:30:04Patch your windows servers now! CVE-2020-1472 (otherwise known as zerologon) allows an attacker to become domain ad… https://t.co/yRVQ7aDs6J https://twitter.com/i/web/status/1309032017959563266Julian_Wampfler
2020-09-24 07:30:04ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/dHMPK7qYSd https://blog.zsec.uk/zerologon-attacking-defending/Acardia2020
2020-09-24 07:20:07#Samba addresses the CVE-2020-1472 #Zerologon Vulnerability https://t.co/U9LaYU8r79 #securityaffairs #hacking #linux https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.htmlsecurityaffairs
2020-09-24 07:20:04#Sicherheitslücke in #Windows CVE-2020-1472 | #Sicherheitsanfälligkeit in Windows #PC -Anmeldunge: https://t.co/4OhqPa3aHp https://it-services.netlogix.de/blog/sicherheitsluecke-windows-cve-2020-1472netlogix_de
2020-09-24 06:20:10In case you missed this, PATCH your Windows Domain controllers NOW. CVE-2020-1472 | Netlogon Elevation of Privile… https://t.co/cOp3YE6dZQ https://twitter.com/i/web/status/1309012566853779462patrickcoomans
2020-09-24 05:50:07ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/9Mkw8fFq2a #appsec #security #secops https://ift.tt/33WsX6Wrtcz_io
2020-09-24 05:00:04Do you know about Zerologon? CVE-2020-1472, or Zerologon, is a great example of the value of virtual patching featu… https://t.co/zvxBmc1WX6 https://twitter.com/i/web/status/1308994315738284037TrendMicroANZ
2020-09-24 04:00:04MSの観測でも既にZerologon(CVE-2020-1472)が実際の攻撃で使われているとのこと。 https://t.co/eOAqvEkXrL https://twitter.com/MsftSecIntel/status/1308941504707063808autumn_good_35
2020-09-24 03:20:06ZeroLogon(CVE-2020-1472) – Attacking & Defending https://t.co/otfLqNtoWG http://hrbt.us/213316hardreboot
2020-09-24 03:00:06New post: "ZeroLogon(CVE-2020-1472) - Attacking & Defending" https://t.co/3DgBPaZZmI https://ift.tt/3hX5fMQMyinfosecfeed
2020-09-24 02:50:07ZeroLogon(CVE-2020-1472) - Attacking & Defending https://t.co/gcEAjdkXdU https://blog.zsec.uk/zerologon-attacking-defending/_r_netsec
2020-09-24 02:20:04Crowdstrike Coverage for Zerologon (CVE-2020-1472) vulnerability https://t.co/HmI8SGQMsN #Crowdstrike #trendmicro… https://t.co/2SvHkPJmKL https://lnkd.in/gVshWry https://twitter.com/i/web/status/1308953875538350081dilsmax
2020-09-24 02:10:04ZeroLogon(CVE-2020-1472) – Attacking & Defending https://t.co/tNGsfsfogv https://www.itsecuritynews.info/zerologoncve-2020-1472-attacking-defending/IT_securitynews
2020-09-24 02:00:04CVE-2020-1472 のパッチあてたら出る!らしい5829〜5831が再現できず困っています(T_T) 同じ様に、5829出ないよー、という方がいる様ですね https://t.co/RVSiT5foY5 NetAppなら出… https://t.co/Yyv8eHrnFZ https://www.reddit.com/r/sysadmin/comments/iwykuh/eventid_5829_for_cve20201472/ https://twitter.com/i/web/status/1308948387140521984NobMiwa
2020-09-24 01:50:04CVE-2020-1472 のパッチあてたら出る!らしい5829〜5831が再現できず困っています(T_T) #CVE-2020-1472 #ZerologonNobMiwa
2020-09-24 01:30:04Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerabilit… https://t.co/GskIEU6Dl4 https://twitter.com/i/web/status/1308941504707063808MsftSecIntel
2020-09-24 01:10:04'ICYMI #Zerologon, tracked as CVE-2020-1472, is an authentication bypass vulnerability in the Netlogon Remote Proto… https://t.co/giIe7xxueT https://twitter.com/i/web/status/1308935442818048002cjkonrad
2020-09-24 00:50:03話題のCVE-2020-1472「netlogon( "ZeroLogon")による認証されていないドメインの乗っ取り」についてsambaから。CVSSは9.8。パッチを適用するか、回避策としてsmb.confに「server s… https://t.co/MzDIXQY9cz https://twitter.com/i/web/status/1308931351933050881sen_u
2020-09-24 00:00:05Microsoft released a patch for the CVE-2020-1472 vulnerability and now the proof-of-concept bug, Zerologon, is read… https://t.co/AjjnlkVxMd https://twitter.com/i/web/status/1308918129590972418KPAudit
2020-09-23 23:40:05Netlogonの脆弱性CVE-2020-1472"ZeroLogon"についてのSambaのガイダンス https://t.co/SW1bZoSeRb https://www.samba.org/samba/security/CVE-2020-1472.htmlEurekaBerry
2020-09-23 23:10:03#Samba addresses the #CVE-2020-1472 #Zerologon #Vulnerability https://t.co/w2k0e4gReT http://ow.ly/9nuX50BzyImomvapt
2020-09-23 22:40:03Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/pjdb8W31RQ http://dlvr.it/RhDJNTdjonesax
2020-09-23 22:20:03米国土安全保障省のCISAはWindowsサーバーの脆弱性「CVE-2020-1472」に関しセキュリティアップデートを適用するよう各政府機関に緊急通達を出した。ドメインコントローラにNetlogonセキュアチャネルの接続を確立す… https://t.co/VX1BMz3P9E https://twitter.com/i/web/status/1308893549358874624ismsecuritynews
2020-09-23 21:00:03SIOSセキュリティブログを更新しました。 Sambaの脆弱性情報(Critical: CVE-2020-1472 (ZeroLogon)と修正バージョン(4.12.7, 4.11.13, 4.10.18))… https://t.co/AutoyFkA7L https://twitter.com/i/web/status/1308873774650064898omokazuki
2020-09-23 20:50:04#Samba addresses the CVE-2020-1472 #Zerologon Vulnerability - https://t.co/U9LaYU8r79 #securityaffairs #hacking #linux https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.htmlsecurityaffairs
2020-09-23 20:40:04Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/3qEy2uoef8 https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerability01ra66it
2020-09-23 20:10:05Abusing CVE-2020-1472 (ZeroLogon) https://t.co/B0a7xEqBCL https://t.co/sKjaHUwHXI https://buff.ly/3iXs3NUmindful_monk
2020-09-23 20:10:04Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/TbSUm6haVd #Infosec https://ift.tt/3j3EVCkSecUnicorn
2020-09-23 20:00:04Un informe fue publicado en dónde se explicaba CVE-2020-1472 a nivel técnico, vulnerabilidad de los servidores Wind… https://t.co/XPvoKYzNOB https://twitter.com/i/web/status/1308858681426161665ResistanceSas
2020-09-23 19:40:06Found some time to read up on CVE-2020-1472 https://t.co/4ySaDh1nCv and I guess we know where the guy who wrote tha… https://t.co/8vCwjtnGfo https://www.cynet.com/zerologon https://twitter.com/i/web/status/1308851577244049409hvcco
2020-09-23 19:20:07#CVE-2020-1472 #ZeroLogon Alert: ‘Critical’ Windows Vulnerability Needs Your Attention. The @Keysight_ATI team put… https://t.co/HwRBiLoIw3 https://twitter.com/i/web/status/1308846182123352066IXIAcom
2020-09-23 18:30:09CVE-2020-1472 https://t.co/BmC2HtUEmi #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-23 18:20:09Detecting and Preventing Exploitation of Critical ZeroLogon Windows Server Vulnerability (CVE-2020-1472)… https://t.co/w8gvRR5Q0v https://twitter.com/i/web/status/1308831583005290498TheHackersNews
2020-09-23 17:10:07Latest: Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/zfU338yZle #blog #infosec #netsec… https://t.co/OTCagqwJwf https://www.hackademicus.nl/samba-addresses-the-cve-2020-1472-zerologon-vulnerability/ https://twitter.com/i/web/status/1308814259397292033Hackademicus
2020-09-23 17:10:03La vulnérabilité CVE-2020-1472 surnommée Zerologon permettant à un pirate de prendre le contrôle d'un domaine Windo… https://t.co/AwBXjyfdRM https://twitter.com/i/web/status/1308815558738145280aveyr_tic
2020-09-23 15:51:07Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/gtFtuCNnHp http://dlvr.it/RhBxZXAcooEdi
2020-09-23 15:50:04Samba addresses the CVE-2020-1472 Zerologon #Vulnerability https://t.co/d4byAJkXfz #SecurityAffairs https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerabilitySecurityNewsbot
2020-09-23 15:50:03Microsoft's patch for the CVE-2020-1472 #vulnerability in the #Netlogon protocol aka #Zerologon is an update you sh… https://t.co/8q7WCm31oM https://twitter.com/i/web/status/1308795731428474881lgomezperu
2020-09-23 15:20:05securityaffairs write "Samba addresses the CVE-2020-1472 Zerologon Vulnerability" See full original article:… https://t.co/VsKzyzE7mi https://twitter.com/i/web/status/1308787147458203648InfoSecPhysa
2020-09-23 15:20:05Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/sflurHzZX1 https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=dlvr.it&utm_medium=twitter&utm_campaign=samba-addresses-zerologon-vulnerabilityHackerSpyNet1
2020-09-23 15:10:06Threat Brief: CVE-2020-1472, also known as "Zerologon," has a "critical" security rating from Microsoft and a CVSS… https://t.co/DJoDFkanBW https://twitter.com/i/web/status/1308783200265797632Nick_Kanavas
2020-09-23 15:10:05Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/PJiMRxorzA https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerabilitysecurity_inside
2020-09-23 15:10:04Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/nmBWIB7Kp8 https://www.itsecuritynews.info/samba-addresses-the-cve-2020-1472-zerologon-vulnerability/IT_securitynews
2020-09-23 15:10:04#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/HUVWOCtQIs https://twitter.com/i/web/status/1308785168640020482deepwatch_sec
2020-09-23 15:00:20r/t "Samba addresses the CVE-2020-1472 Zerologon Vulnerability" https://t.co/Vh0BZvpr61 https://bit.ly/301oZc6profxeni
2020-09-23 14:41:57Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/BY1tiI4EsP #cybersecurity https://t.co/85SmJvi4Kx http://twib.in/l/p67jx8zbR9GEaglongo
2020-09-23 14:41:53#Samba addresses the CVE-2020-1472 #Zerologon Vulnerability https://t.co/U9LaYU8r79 #securityaffairs #hacking #linux https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.htmlsecurityaffairs
2020-09-23 14:40:55Samba addresses the CVE-2020-1472 Zerologon Vulnerability: Samba team has released a security patch to address the… https://t.co/BMkwHRx1dH https://twitter.com/i/web/status/1308777277539250177shah_sheikh
2020-09-23 14:40:53Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/4R8ve1rHmf https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerabilitythedpsadvisors
2020-09-23 14:40:49Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/vIxT0pMdZa #Security #CVE20201472… https://t.co/TJx3GaF7yj https://securityaffairs.co/wordpress/108659/security/samba-addresses-zerologon-vulnerability.html?utm_source=rss&utm_medium=rss&utm_campaign=samba-addresses-zerologon-vulnerability https://twitter.com/i/web/status/1308777329737502722LudovicoLoreti
2020-09-23 14:40:28Samba addresses the CVE-2020-1472 Zerologon Vulnerability https://t.co/FzcjSprTpw http://dlvr.it/RhBxltFiveGmbh
2020-09-23 14:12:14#Microsoft's patch for the CVE-2020-1472 vulnerability in the Netlogon protocol aka Zerologon is an update you shou… https://t.co/e1Azn29nLV https://twitter.com/i/web/status/1308768158380064768kaspersky
2020-09-23 14:12:06Grâce au Patch Tuesday d’août #Microsoft a corrigé plusieurs vulnérabilités dont CVE-2020-1472. La vulnérabilité du… https://t.co/mmFIHzMLfk https://twitter.com/i/web/status/1308768456112844800kasperskyfrance
2020-09-23 13:40:12そういえばソースコード忘れてたので追記します CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/sgveHHDlli @YouTubeより https://youtu.be/1h_wlMWwyB4fwarashi
2020-09-23 13:20:08CVE-2020-1472/Zerologon. As an IT manager should I worry? https://t.co/UtSpwPn9bA #CyberSecurity https://www.pentestpartners.com/security-blog/cve-2020-1472-zerologon-as-an-it-manager-should-i-worry/Gate_15_Analyst
2020-09-23 13:10:13A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/pxpHju0mDQ https://twitter.com/i/web/status/1308754750335315969CaraWainwright7
2020-09-23 13:10:08@msftsecresponse For confirmation, does KB4578013 include the patch for CVE-2020-1472 since it superceeds KB4571723? thanksJGDiver1
2020-09-23 13:00:14Cómo proteger un entorno AD del CVE-2020-1472. 1) Desplegar el parche (Agosto 2020) 2) Monitorizar para ver los dis… https://t.co/nWbnd59UNk https://twitter.com/i/web/status/1308751457496240128manelrodero
2020-09-23 12:50:18وبینار «بررسی و تحلیل آسیب‌پذیری CVE-2020-1472» راس ساعت ۱۸ امروز شروع می‌شه: https://t.co/BuKgPtf2bI https://t.co/a1E35ut08E https://bit.ly/35RTZiu https://twitter.com/RavinAcademy/status/1307323455294115848RavinAcademy
2020-09-23 12:00:16How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/Z14BD4Jm88 #MSIgnite https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocsamilaiho
2020-09-23 11:40:09Point and click remote domain compromise doesn't get much worse than Zerologon (CVE-2020-1472 Critical Privilege Es… https://t.co/J9gBpiQnqk https://twitter.com/i/web/status/1308730471916994561pwntestpartners
2020-09-23 11:10:10#Cybersecurity #InfoSec CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección ~ Flu… https://t.co/ljeFInF2js https://twitter.com/i/web/status/1308723433199591424SritaKaren
2020-09-23 09:40:03原理がわかりました!!! ついでに僕がCFBモードの理解間違えていたことに気がついた。block毎に暗号化すると思ってたけどスライドしながら暗号化するのか……(無駄多くない? wow) CVE-2020-1472 ZeroLog… https://t.co/b0DRzUNWLb https://twitter.com/i/web/status/1308701899168780290theoremoon
2020-09-23 09:20:04Zer0dump is an PoC exploit tool for abusing #vulnerabilities associated with CVE-2020-1472 to initiate full system… https://t.co/C8LTLYJucq https://twitter.com/i/web/status/1308696088065576960blackhatcats
2020-09-23 07:50:04CVE-2020-1472, or Zerologon, is a great example of the value of virtual patching featured in our products. See why… https://t.co/I8QJjnKn5W https://twitter.com/i/web/status/1308674452264280064TrendMicroAMEA
2020-09-23 07:40:05CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección https://t.co/4X5gCcMYd0 https://ift.tt/3iV221JSamuraiBlanco
2020-09-23 07:30:05Story Nr. 2: CVE-2020-1472, auch #Zerologon genannt. Eine Sicherheitslücke mit einem Gefährlichkeits-Score von 10/1… https://t.co/kHWmFUGxds https://twitter.com/i/web/status/1308667697652260864haunschmidtech
2020-09-23 07:20:07threatmeter: Samba Releases Security Update for CVE-2020-1472: Original release date: September 21, 2020 The Samba… https://t.co/O72JvOM6mL https://twitter.com/i/web/status/1308665493927202823SecurityMagnate
2020-09-23 07:20:05threatmeter: Samba Releases Security Update for CVE-2020-1472 Original release date: September 21, 2020 The Samba… https://t.co/sUIT2zxxhH https://twitter.com/i/web/status/1308665520191930369SecurityMagnate
2020-09-23 07:10:09Samba Releases Security Update for CVE-2020-1472 Original release date: September 21, 2020 The Samba Team has rele… https://t.co/HGJOvtAHJW https://twitter.com/i/web/status/1308663000413483013threatmeter
2020-09-23 06:40:03CVE-2020-1472 oder wie Profis sagen: Single SignOn 🤷TeddyKopernikus
2020-09-23 06:20:04【Windows曝重大漏洞 美国土安全部罕见催更】 美国国土安全部日前向政府部门发出紧急警告,强烈要求所有采用微软Windows Sever各版本的相关机构,立即修补名为CVE-2020-1472的严重资安漏洞,避免被黑客用来… https://t.co/vH3Kgi3ADS https://twitter.com/i/web/status/1308650775338536960crystal78243104
2020-09-23 06:10:12Windowsドメインコントローラーの乗っ取りを許す可能性のある、Netlogonプロトコルの脆弱性CVE-2020-1472(別名:Zerologon)について。 該当する環境をお持ちの場合はご対応を。Microsoftから出て… https://t.co/Z0pfMCRb7b https://twitter.com/i/web/status/1308647362689200128kaspersky_japan
2020-09-23 05:20:07CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección https://t.co/6eVZdWF5vP https://ift.tt/3iV221J3m1l
2020-09-23 05:20:07[Recomendado]CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección… https://t.co/mmX8tWgvA4 https://twitter.com/i/web/status/1308634920663818241seguridad_si
2020-09-23 05:20:07CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección🏴‍☠️🔒 #hacking #cibersecurity https://t.co/TYodAqqFWT https://www.flu-project.com/2020/09/zerologon.htmlandalinux
2020-09-23 05:10:06CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección - https://t.co/rqYwbtUiWp vía @fluproject http://www.flu-project.com/2020/09/zerologon.htmlZerolynxOficial
2020-09-23 05:10:04CVE-2020-1472 - Zerologon: Por qué debes priorizar el parcheo antes que la detección - https://t.co/EWIw5nRlVE. por… https://t.co/Sy6elxP3Xl https://www.flu-project.com/2020/09/zerologon.html https://twitter.com/i/web/status/1308633299175211008fluproject
2020-09-23 05:00:05#Zerologon detection: a technical analysis of CVE-2020-1472 and how to detect it. https://t.co/tlnjCW8Zs1 https://www.cynet.com/attack-techniques-hands-on/zerologin-vulnerability-analysis-and-detection-tools/_j0sh_adams_
2020-09-23 04:30:03A blogpost to provide an overview of #CVE-2020-1472 ( #Zerologon) along with what you can do in terms of exploitati… https://t.co/qpD5md5kwH https://twitter.com/i/web/status/1308624460887420933riyazwalikar
2020-09-23 04:00:04CVE-2020-1472をテストできるスクリプト https://t.co/c6qDq2ruz9 https://github.com/SecuraBV/CVE-2020-1472GOETAN_GOETAN
2020-09-23 04:00:04最新編號CVE-2020-1472,又名為Zerologon的漏洞 記得修補一下漏洞 https://t.co/yCH6WnT8wV https://www.ithome.com.tw/news/140090m54068
2020-09-23 04:00:03おもしろい(おもしろくない) 【Zerologon(CVE-2020-1472)】PoC有りWindowsのドメインコントローラが乗っ取られる脆弱性の仕組みと対策 https://t.co/1pV80pv5nq https://at-virtual.net/%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3/%e3%80%90cve-2020-1472%e3%80%91poc%e6%9c%89%e3%82%8awindows%e3%81%ae%e3%83%89%e3%83%a1%e3%82%a4%e3%83%b3%e3%82%b3%e3%83%b3%e3%83%88%e3%83%ad%e3%83%bc%e3%83%a9%e3%81%8c%e4%b9%97%e3%81%a3%e5%8f%96/maguro_infra
2020-09-23 03:40:04今週の #セキュリティのアレ も面白かった! 最初の根岸さんから紹介があった脆弱性 Zerologon(CVE-2020-1472)の話、めっちゃCTF問!ivが0固定で設定されていることに起因して、暗号文が推測しやすくなっちゃう… https://t.co/GBryX2IpuT https://twitter.com/i/web/status/1308609592331362306kusuwada
2020-09-23 02:50:05Sambaの複数の脆弱性情報(Critical: CVE-2020-1472 (ZeroLogon)と修正バージョン(4.12.7, 4.11.13, 4.10.18) - OSS脆弱性ブログ https://t.co/0BDuGtSpRm https://security.sios.com/vulnerability/samba-security-vulnerability-20200924.htmlohhara_shiojiri
2020-09-23 02:30:03A new vulnerability – CVE-2020-1472. #Zerologon, allows an attacker to use the Netlogon process to impersonate iden… https://t.co/mwDgSWgwcQ https://twitter.com/i/web/status/1308592152839155714astevens15
2020-09-23 01:20:02Samba: CVE-2020-1472 Unauthenticated domain takeover via netlogon ("ZeroLogon") #Samba #windows #infosec #security https://t.co/YIHqXK0Ket https://www.samba.org/samba/security/CVE-2020-1472.htmlozuma5119
2020-09-22 23:40:03The latest update for #Splunk includes "Splunking #Azure: Event Hubs" and "Detecting CVE-2020-1472 (CISA ED 20-04)… https://t.co/kxMzizLV0B https://twitter.com/i/web/status/1308549683875328000opsmatters_uk
2020-09-22 21:10:13Proof-of-concept (POC) code was published to exploit an elevation of privilege vulnerability – CVE-2020-1472 – foun… https://t.co/D4xmLr54rG https://twitter.com/i/web/status/1308511549653475329tssecure
2020-09-22 21:00:03A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/0fW5hAZh38 https://twitter.com/i/web/status/1308510388632387597steveneville1
2020-09-22 20:30:07Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/I8cxoz9x7H https://twitter.com/Palabradehacker/status/1308501278746644487SLujanTwT
2020-09-22 20:10:07Samba Releases Security Update for CVE-2020-1472: Original release date: September 21, 2020 The Samba Team has… https://t.co/emToYfdVe4 https://goo.gl/fb/DRKiu9threatmeter
2020-09-22 19:00:03Just found out about CVE-2020-1472 from CISA 20-04. It's crazy how (pretty) simple it was to exploit this. From wha… https://t.co/kJTgcw8eRV https://twitter.com/i/web/status/1308480569664303105RobbieBePoppin
2020-09-22 19:00:03Samba Releases Security Update for CVE-2020-1472 https://t.co/MjWcintxsS https://www.samba.org/samba/security/CVE-2020-1472.htmlAnonAnonymous
2020-09-22 18:30:12CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-22 18:10:02These are the two SIEM rules to detect Netlogon (CVE-2020-1472) But my question is, what false positives have yo… https://t.co/kF51OSekkr https://twitter.com/i/web/status/1308468238217547776blueteamblog
2020-09-22 17:40:11Windows Admins - Beware! 'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attac… https://t.co/olJfS9MvSz https://twitter.com/i/web/status/1308458586628997120NickLagalante
2020-09-22 16:40:04Samba addresses Critical Zerologon vulnerability (CVE-2020-1472) https://t.co/i2viAXdWkO #Samba #Zerologon… https://t.co/IDbwd2mbl5 https://buff.ly/3kIQgrx https://twitter.com/i/web/status/1308443630982619138securezoo
2020-09-22 16:20:03🚨 La faille #Zerologon fait trembler le département de la sécurité intérieure US 💣 La récente faille CVE-2020-1472… https://t.co/hsI1xFmKs9 https://twitter.com/i/web/status/1308438508697079809Prohacktiv3
2020-09-22 16:00:05CVE-2020-1472 ZeroLogonの原因をわかりやすく解説! https://t.co/sgveHHDlli @YouTubeより https://youtu.be/1h_wlMWwyB4fwarashi
2020-09-22 16:00:04New post: แจ้งเตือนช่องโหว่ระดับวิกฤติ Zerologon (CVE-2020-1472) ยึด Domain controller ได้ มีโค้ดโจมตีแล้ว – Bangko… https://t.co/J6eeGl3f8W https://twitter.com/i/web/status/1308434831529766915digitpol_cyber
2020-09-22 15:30:03Samba Releases Security Update for CVE-2020-1472 https://t.co/jSpa64Ednr https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472DoITSecurity
2020-09-22 15:20:04A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/xoZxPfdQOS https://twitter.com/i/web/status/1308423816104808450TrendMicroUK
2020-09-22 14:10:03Detecting CVE-2020-1472 (CISA ED 20-04) Using #Splunk Attack Range https://t.co/gAD5FvSN8B @splunk https://t.co/Y3w069vDfl https://splk.it/2FYJOOahurricanelabs
2020-09-22 13:50:03Security Alert: Microsoft Update CVE-2020-1472 Available to Address Critical Security Vulnerability in Windows Doma… https://t.co/XwbN0dQU5S https://twitter.com/i/web/status/1308401507805605888Databranch
2020-09-22 13:20:04Samba Releases Security Update for CVE-2020-1472 https://t.co/O2E1In6QhD https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472microkeyword
2020-09-22 13:10:03“【Zerologon(CVE-2020-1472)】PoC有りWindowsのドメインコントローラが乗っ取られる脆弱性の仕組みと対策 – Self branding” https://t.co/yXMl8Zad4R https://htn.to/2MyGQcS9Pawaiha8
2020-09-22 13:00:03Samba Releases Security Update for CVE-2020-1472 https://t.co/tsnN3leMTq https://t.co/Ze86ZSY7Lg https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472SecureNetIT
2020-09-22 13:00:03Security News - Samba A security update has been released for CVE-2020-1472 https://t.co/sZBgYgNlax https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update/cve-2020-1472pcdoctorswr
2020-09-22 12:50:02Befehl von ganz oben: CVE-2020-1472 patchen https://t.co/CDlg3D6uqA https://buff.ly/3hSjzq1inside_it
2020-09-22 12:30:03Samba is also affected by the Zerologon vulnerability (CVE-2020-1472) - https://t.co/4LQO1sreaG - #cybersecurity… https://t.co/GC8aZ9qmtb https://www.samba.org/samba/security/CVE-2020-1472.html https://twitter.com/i/web/status/1308380613473382401ZeljkaZorz
2020-09-22 12:20:03The Zero-LogOn Exploit (CVE-2020-1472) https://t.co/451iDzofJf https://hubs.ly/H0wGR8m0Security7Net
2020-09-22 12:20:02Security Releases available for SAMBA+ 4.12.7, 4.11.13 and 4.10.18 – the packages address CVE-2020-1472 (#ZeroLogon… https://t.co/0xtoYlYtOS https://twitter.com/i/web/status/1308380352726142976SAMBAplus
2020-09-22 12:10:04Following last week’s buzz on CVE-2020-1472, which is a flaw on the Netlogon protocol, Samba announced new patches.… https://t.co/C9X2mTkBqb https://twitter.com/i/web/status/1308375618690732033SeconCyber
2020-09-22 11:50:03先日Retired ステータスになった #HackTheBox の「Multimaster」マシン。 ZeroLogin(CVE-2020-1472)脆弱性が刺さるらしい。 今ならまだ無料で実機を用意せずに話題の脆弱性についてトラ… https://t.co/NdbMS1haT4 https://twitter.com/i/web/status/1308372237909520384v_avenger
2020-09-22 11:50:03If you have not applied @Microsoft patch CVE-2020-1472 released in August, do so now... The @USCERT_gov issued an… https://t.co/tbl1AHatzy https://twitter.com/i/web/status/1308371727601238016thingssandy
2020-09-22 11:30:04“Samba Releases Security Update for CVE-2020-1472 | CISA” https://t.co/sGrfhcadvI https://htn.to/418EhnLSD2waiha8
2020-09-22 11:20:02CVE-2020-1472 / “Samba - Security Announcement Archive” https://t.co/DMxLT1fM3C https://htn.to/ftpUnyTNLiwaiha8
2020-09-22 10:10:35Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren | https://t.co/f6M1IChZO7 https://t.co/UEl9Uh7SLt http://ZDNet.de https://buff.ly/3iVJnTADSAgentur
2020-09-22 10:00:07CISA Releases Emergency Directive on Microsoft Windows Netlogon Remote Protocol #CVE-2020-1472. An unauthenticated… https://t.co/bqVmXrTYER https://twitter.com/i/web/status/1308344045090025477torvalstrom
2020-09-22 08:40:10Samba Releases Security Update for CVE-2020-1472: https://t.co/3OMc0UzYxS #follow & #RT #cybersecurity #infosec https://ift.tt/33KMLdzKeoXes
2020-09-22 08:30:12Top story: Samba Releases Security Update for CVE-2020-1472 | CISA https://t.co/AJFgcgDszF, see more https://t.co/op6V5mLutF https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472 http://tweetedtimes.com/v/16476?s=tnpinfowaropcenter
2020-09-22 08:30:05Defensive Guidance for ZeroLogon (CVE-2020-1472) #hunt #detect https://t.co/rgRmtqmorz https://t.co/R2lyo9NQUS https://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ https://github.com/GossiTheDog/ThreatHunting/tree/master/AzureSentinelahmet_han64
2020-09-22 08:00:06Samba has released security updates to address CVE-2020-1472 ^ID https://t.co/9IdhD9kRdG https://go.usa.gov/xGPSUMOQdigitalSOC
2020-09-22 07:50:21Do you want to quickly test your network for the CVE-2020-1472 #Zerologon vulnerability on a Windows system without… https://t.co/6PaQzmzVR4 https://twitter.com/i/web/status/1308310120678518785su13ym4n
2020-09-22 07:40:55How to safely test the #CVE-2020-1472 #Zerologon #vulnerability on a #Windows environment, without installing… https://t.co/tbeIWigrdc https://twitter.com/i/web/status/1308307566112509953PicusSecurity
2020-09-22 07:40:43Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/Ewv5PmZGFj #Windows… https://t.co/NwEuiG4b68 https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html https://twitter.com/i/web/status/1308308084763353088ptracesecurity
2020-09-22 07:40:16#blognon ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง… https://t.co/KB9UCdyPKf https://twitter.com/i/web/status/1308309395999162368OutdoWorld
2020-09-22 07:30:08Samba Releases Security Update for CVE-2020-1472 https://t.co/QKMVoIVQUV https://ift.tt/33KMLdzbug_less
2020-09-22 07:10:14Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack... https://t.co/lu106oitr9 https://t.co/Ydn7VyzDkz… https://t.co/JQ8c67MFS0 http://news.torii-security.fr/s/nwryzx https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.html https://twitter.com/i/web/status/1308300008815435776torii_security
2020-09-22 07:10:11Samba Releases Security Update for CVE-2020-1472 https://t.co/WLcnrHAzcB #uscert #gov https://buff.ly/32O9rKrNotTruppi
2020-09-22 07:10:07Samba Releases Security Update for CVE-2020-1472 https://t.co/e3xhdlevu2 https://ift.tt/33KMLdzcyberbuzznews
2020-09-22 06:20:11⁦@CISAgov⁩ Emergency @Windows patch directive ; patch CVE-2020-1472 do it ASAP. The CVSS-perfect 10 flaw that ⁦… https://t.co/B4N0W2nllj https://twitter.com/i/web/status/1308287426016808960PeterJopling
2020-09-22 06:10:04Samba Releases Security Update for CVE-2020-1472 https://t.co/5tn3N63Koq #CERT #CyberSecurity #InfoSec #SOC #TousSecNum https://bit.ly/3hPKLWscyberdian_cert
2020-09-22 05:50:03CVE-2020-1472を検証しようとAzure契約したのにAD作ろうとしたらKB4577015入っちゃって消せなくて悲しみ(-́◞८͙༙◟-̀)SecNiku
2020-09-22 05:45:39CVE-2020-1472 Netlogon Vulnerability An unauth priv escalation vulnerability was found in Netlogon Remote Protocol… https://t.co/xKfy7gaDi9 https://twitter.com/i/web/status/1307967553885663232TheCyphere
2020-09-22 05:40:04Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren https://t.co/y1d7fM3Iyp https://t.co/d3dLCb2uoY http://dlvr.it/Rh5VbWhugenerinfo
2020-09-22 05:30:03Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren - https://t.co/71MQ0iEQJf https://blog.com-sys.de/2020/09/22/zerologon-us-behoerden-sollen-patch-fuer-cve-2020-1472-installieren/ComSysGmbH
2020-09-22 02:20:03なんだかまたインフラ屋さんが大変になってそうだ Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/Twi8IYux3r @jpcert https://www.jpcert.or.jp/newsflash/2020091601.htmlnao_hucky
2020-09-22 02:10:03Samba Releases Security Update for CVE-2020-1472 https://t.co/59fStL7Acf #HSToday https://bit.ly/2FY7baNHSTodayMag
2020-09-22 01:30:03【Zerologon(CVE-2020-1472)】PoC有りWindowsのドメインコントローラが乗っ取られる脆弱性の仕組みと対策 https://t.co/yprhlKFwNW https://at-virtual.net/%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3/%E3%80%90cve-2020-1472%E3%80%91poc%E6%9C%89%E3%82%8Awindows%E3%81%AE%E3%83%89%E3%83%A1%E3%82%A4%E3%83%B3%E3%82%B3%E3%83%B3%E3%83%88%E3%83%AD%E3%83%BC%E3%83%A9%E3%81%8C%E4%B9%97%E3%81%A3%E5%8F%96/0x009AD6_810
2020-09-22 00:10:04A vulnerabilidade CVE-2020-1472 no protocolo Netlogon, também conhecido como Zerologon, permite que invasores seque… https://t.co/aNVczCrh63 https://twitter.com/i/web/status/1308194561097961472Kasperskybrasil
2020-09-21 23:30:02The latest update for #CloudPassage includes "#Zerologon: Windows Netlogon Vulnerability CVE-2020-1472" and "AWS… https://t.co/R5dG7ImJHw https://twitter.com/i/web/status/1308184755628843008opsmatters_uk
2020-09-21 23:20:05[日本語: Japanese] CVE-2020-1472 Zerologon 攻撃検証デモ - YouTube https://t.co/TtPjRFlgXn https://www.youtube.com/watch?v=qsMvCLPjSpc0x009AD6_810
2020-09-21 22:50:05Samba "ZeroLogon"の脆弱性を修正 | Samba Releases Security Update for CVE-2020-1472 https://t.co/U47TzZzJW2 https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472muumuubokujo
2020-09-21 22:00:03Samba Releases Security Update for CVE-2020-1472 https://t.co/POE1MQNmvM http://dlvr.it/Rh4ZrZamolsarwate
2020-09-21 21:50:03Serious question on CVE-2020-1472. How many are just rushing to patch domain controllers, and how many are patching all windows servers?infosec_4life
2020-09-21 21:40:06Samba Releases Security Update for CVE-2020-1472 https://t.co/tIDapq5H09 https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472nekochanSec555
2020-09-21 21:30:05ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง | Blognone… https://t.co/6lX6qcjimM https://twitter.com/i/web/status/1308154971947503617Saipaannana
2020-09-21 21:30:04Company named Secura detailed how one could exploit CVE-2020-1472.Named the process “Zerologon” because it allows a… https://t.co/IP516UI7jn https://twitter.com/i/web/status/1308156227621330945piperwalt1
2020-09-21 21:30:04The latest update for #Splunk includes "Detecting CVE-2020-1472 (CISA ED 20-04) Using Splunk Attack Range" and "Spl… https://t.co/wTCg091crK https://twitter.com/i/web/status/1308155872867123200opsmatters_uk
2020-09-21 21:30:03Samba Releases Security Update for CVE-2020-1472 | CISA https://t.co/zARMwhh9ew https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472_T_MKI
2020-09-21 21:20:06Samba Releases Security Update for CVE-2020-1472 https://t.co/p2aBZs6TwQ https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472HenkvanRoest
2020-09-21 21:10:04Here's how you can find and remediate the latest vulnerability Zerologon (CVE-2020-1472) using Tanium. #Zerologon… https://t.co/6NxIfS8h1L https://twitter.com/i/web/status/1308150055711502337smullis
2020-09-21 21:10:04Here's how you can find and remediate the latest vulnerability Zerologon (CVE-2020-1472) using Tanium. #Zerologon… https://t.co/6rsslK49vS https://twitter.com/i/web/status/1308149655910445056imPOSHster
2020-09-21 20:50:04CERT Samba Releases Security Update for CVE-2020-1472 https://t.co/Y5jEcuNiyi https://bit.ly/32QaN7NPAUL_CSFI
2020-09-21 20:40:15Here's how you can find and remediate the latest vulnerability Zerologon (CVE-2020-1472) using Tanium. #Zerologon… https://t.co/UFsws7v1g2 https://twitter.com/i/web/status/1308141457904218113Tanium
2020-09-21 20:30:04Samba has released security updates to address CVE-2020-1472. Learn more at https://t.co/VhdVRMS0VA. #Cyber #Cybersecurity #InfoSec https://go.usa.gov/xGPSUUSCERT_gov
2020-09-21 20:10:02Samba Releases Security Update for CVE-2020-1472 https://t.co/6fOKdfa0XH https://www.itsecuritynews.info/samba-releases-security-update-for-cve-2020-1472/IT_securitynews
2020-09-21 20:00:06#infosec Samba Releases Security Update for CVE-2020-1472 https://t.co/7kkysiV8it https://ift.tt/33KMLdzjeffreydbrown
2020-09-21 20:00:05ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง… https://t.co/UmrlysaoeQ https://twitter.com/i/web/status/1308131464094134273ArchMerciGod
2020-09-21 20:00:04Samba Releases Security Update for CVE-2020-1472 https://t.co/yh6grj31QG #uscert #security https://bit.ly/3iQPYylATTOGTech
2020-09-21 19:40:03Samba Releases Security Update for CVE-2020-1472 https://t.co/Gi5i2cRnKZ https://sl.advdat.com/2RNjc5mADVDAT_OH
2020-09-21 19:40:03Samba Releases Security Update for CVE-2020-1472 https://t.co/dtXSAU24Li #cert #security https://bit.ly/3iQPYylSiciliamConsult
2020-09-21 19:40:03Truth about CVE-2020-1472 no one want to tell you I will , before even you reach that vul you have to make so much… https://t.co/M0lZCzN0Mc https://twitter.com/i/web/status/1308126394417905665_Rzero
2020-09-21 19:30:05Zerologon: Windows Netlogon Vulnerability CVE-2020-1472 https://t.co/RJYdq21fx6 https://t.co/epT7ewapbX http://dlvr.it/Rh4CX6amolsarwate
2020-09-21 19:30:04How to detect Zerologon or CVE-2020-1472? Read our latest blog to learn more https://t.co/ho6Gn0RuOv… https://t.co/r4zhPvtOPN https://bit.ly/3ci2u7E https://twitter.com/i/web/status/1308124300344307712cloudpassage
2020-09-21 19:30:02Samba Releases Security Update for CVE-2020-1472https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-rel… https://t.co/PC9WoB54cY https://twitter.com/i/web/status/1308126016100069377gregoryfarley
2020-09-21 19:20:03Samba Releases Security Update for CVE-2020-1472 https://t.co/hNS3A8BHvN https://us-cert.cisa.gov/ncas/current-activity/2020/09/21/samba-releases-security-update-cve-2020-1472?utm_source=dlvr.it&utm_medium=twitterRigneySec
2020-09-21 19:20:02Samba Releases Security Update for CVE-2020-1472 https://t.co/093tUEwqix https://bit.ly/3iVVwYwblu3cloak
2020-09-21 19:10:06ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง https://t.co/8m2KSG7aCX #Blognone https://www.blognone.com/node/118563?utm_source=twitter&utm_medium=thaitechfeed&utm_campaign=thaitechfeedthaitechfeed
2020-09-21 19:10:03ศูนย์มั่นคงไซเบอร์สหรัฐฯ ออกประกาศฉุกเฉินสั่งแพตช์ช่องโหว่ CVE-2020-1472 บนเซิร์ฟเวอร์ของรัฐบาลกลาง https://t.co/kstmytPxR8 https://www.blognone.com/node/118563blognone
2020-09-21 18:30:07CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-21 18:20:02Please make sure you've patched the Zerologon / CVE-2020-1472 bug "Any attacker on the local network (such as a ma… https://t.co/teyvxxoCQU https://twitter.com/i/web/status/1308108657704353792TheRegister
2020-09-21 18:10:07Recommendations for @Microsoft #Netlogon vulnerability (CVE-2020-1472, a.k.a. #Zerologon) that allows an unauthenti… https://t.co/hYB1j1AGLX https://twitter.com/i/web/status/1308104206868508673qualys
2020-09-21 18:10:07#Microsoft's patch for the CVE-2020-1472 vulnerability in the Netlogon protocol aka Zerologon is an update you shou… https://t.co/iHHkQmBQJ8 https://twitter.com/i/web/status/1308104118456782848kaspersky
2020-09-21 18:10:05#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/lqjxvVMJFo https://twitter.com/i/web/status/1308105107914067980deepwatch_sec
2020-09-21 17:50:04Learn how to detect the recent #Zerologon exploitation (CVE-2020-1472) in real-time, without signatures or agents,… https://t.co/EOetGecOE8 https://twitter.com/i/web/status/1308099915101253632ExtraHop
2020-09-21 17:20:04All Synology NAS need to be upgraded to DSM v4.4.5-0101 or above to patch vulnerability CVE-2020-1472 (CVSS Score:… https://t.co/ZWHC0pToSo https://twitter.com/i/web/status/1308091847403868161GaetanICT
2020-09-21 17:10:11Last month, #Microsoft released a patch for critical vulnerability CVE-2020-1472, also known as the Zerologon vulne… https://t.co/zX7ajesCKm https://twitter.com/i/web/status/1308088926993817600kaspersky
2020-09-21 16:40:03Let's try CVE-2020-1472 aka Zerologon with Multimaster from HackTheBox https://t.co/pznP4GBMtT via @YouTube https://youtu.be/7lSwRQWyoHAMasashi30555047
2020-09-21 16:10:07CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability-Government agencies ordered to deploy patches by midn… https://t.co/oTnLnZUigw https://twitter.com/i/web/status/1308073559927984129JeffEnglander
2020-09-21 15:30:03A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/s6uJ0KtVHX https://twitter.com/i/web/status/1308063701283549186jamesgreilly
2020-09-21 15:10:03Have you updated all of your @Windows Server clients to address the critical vulnerability, CVE-2020-1472? Read mor… https://t.co/yiVudLWJxg https://twitter.com/i/web/status/1308060171332186112KaseyaCorp
2020-09-21 15:00:03A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/tXrKjfHwNK https://twitter.com/i/web/status/1308057384854663170sdemarzio75
2020-09-21 15:00:02Zerologon Proof of Concept Code Available for CVE-2020-1472 (Windows Netlogon Elevation of Privilege) https://t.co/VfkIxwSvQA https://fortiguard.com/threat-signal-report/3680/zerologon-proof-of-concept-code-now-available-cve-2020-1472-windows-netlogon-elevation-of-privilegeRMJConsulting
2020-09-21 14:40:12It has been advised to immediately patch CVE-2020-1472. It allows attackers to instantly become domain admin by sub… https://t.co/XjhzHYnTxp https://twitter.com/i/web/status/1308051116333117440dulenkp
2020-09-21 14:40:10Zerologon CVE-2020-1472 Vulnerability Automated Patching https://t.co/8wu3XG71rg https://www.virtualizationhowto.com/2020/09/zerologon-cve-2020-1472-vulnerability-automated-patching/vspinmaster
2020-09-21 14:40:03CISA issues emergency directive on CVE-2020-1472 ('Zerologon'), for which exploit code exists in the wild https://t.co/3v2z8XPh9Z https://cyber.dhs.gov/ed/20-04/virusbtn
2020-09-21 14:10:03“Immediate and emergency action” required to patch CVE-2020-1472, the CVSS-perfect-ten-rated flaw that allows attac… https://t.co/S4wd0dbrQR https://twitter.com/i/web/status/1308045371822702594Karl_Steinkamp
2020-09-21 13:40:06#windowserver #patch on CVE-2020-1472 considered national #Emergency in #usa, so everybody must follow this direct… https://t.co/QjdDxOr0gx https://twitter.com/i/web/status/1308036126884716548IcemanRivas
2020-09-21 13:30:04Threat Brief: CVE-2020-1472, also known as "Zerologon," was given a "critical" security rating from Microsoft and a… https://t.co/kRh45U2I0t https://twitter.com/i/web/status/1308033306173337601fhawalla
2020-09-21 13:10:03US - instructs the Federal Civilian Executive Branch agencies to apply August 2020 security update (CVE-2020-1472) https://t.co/5qjuxffwyO https://twitter.com/CISAgov/status/1307148926366212099papervote
2020-09-21 12:50:05Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren - https://t.co/qcYhCkWV39 #it-business #it #onlinemarketing @webnic https://ift.tt/32OFWs9webnic
2020-09-21 12:20:06[- Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren -] https://t.co/sxo6VIGxPZ #ITsec #sicherheit https://ift.tt/32OFWs9itsecdump
2020-09-21 12:20:05CVE-2020-1472 #Zerologon "Admins müssen nun handeln und Server aktualisieren. Ist das nicht möglich, müssen verwund… https://t.co/80Ss8NIURj https://twitter.com/i/web/status/1308016946978467840__ud3x__
2020-09-21 12:10:03New post: Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren https://t.co/TQocx7aeIC https://reportcybercrime.com/zerologon-us-behorden-sollen-patch-fur-cve-2020-1472-installieren/digitpol_cyber
2020-09-21 12:00:04Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren https://t.co/ltm7pJNUGS https://t.co/otn6L2Epc8 https://j.mp/2RM8Gvadavidkehr
2020-09-21 10:40:03CISA issues rare critical warning to patch systems to apply the August 2020 security update (CVE-2020-1472) for Mic… https://t.co/vlJJgqMtyh https://twitter.com/i/web/status/1307992049120051200scottrdavis
2020-09-21 10:20:03Netlogon protokolündeki CVE-2020-1472 güvenlik açığı, diğer adıyla Zerologon, saldırganların Windows alan denetleyi… https://t.co/KZOHOs1gjf https://twitter.com/i/web/status/1307986446532456448KasperskyTR
2020-09-21 10:10:06🔵 ZEROLOGON VULNERABILITY (CVE-2020-1472) The Department of National Security issued the order to patch the vulner… https://t.co/1gk1AYtxnX https://twitter.com/i/web/status/1307983831429984256S21sec
2020-09-21 10:10:03The target of the latest emergency directive from the Department of National Security is the CVE-2020-1472 vulnerab… https://t.co/jAAWIehgUu https://twitter.com/i/web/status/1307984699650908168S21sec
2020-09-21 10:00:03🔵ZEROLOGON VULNERABILITY (CVE-2020-1472) The Department of Homeland Security issued the order to patch the vulnerab… https://t.co/tHsYYUwFxG https://twitter.com/i/web/status/1307982178068897792S21sec
2020-09-21 10:00:02The target of the latest emergency directive is the CVE-2020-1472 vulnerability, also known as Zerologon. Microsoft… https://t.co/Hh95hsSRZd https://twitter.com/i/web/status/1307982264169619456S21sec
2020-09-21 09:30:04@DrIsaPantami @KashifuInuwa @NITDANigeria CVE-2020-1472 just for your info. What does it take to gain access; just attack an employee.iamTowloo
2020-09-21 09:20:03Affected by #Zerologon (CVE-2020-1472) but unable to apply relevant Windows updates for some reason? @0patch has an… https://t.co/QYBrGMVGyg https://twitter.com/i/web/status/13079710663216046130patch
2020-09-21 09:10:07@KashifuInuwa @NITDANigeria CVE-2020-1472 just for your info. What does it take to gain access; just attack an employee.iamTowloo
2020-09-21 09:10:07Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren https://t.co/VCTW1ApNgT http://dlvr.it/Rh2DkhAnonNewsDE
2020-09-21 09:00:05Affected by Zerologon (CVE-2020-1472) but unable to apply relevant Windows updates for some reason? @0patch has an… https://t.co/0lRAcIJnLH https://twitter.com/i/web/status/13079661333503959040patch
2020-09-21 08:50:05CVE-2020-1472 #BlueTeam tip: if patching immediately is impossible, monitor event ID 4662 being triggered multiple… https://t.co/hHzgo33CG1 https://twitter.com/i/web/status/1307963668299218944Mal1ekM
2020-09-21 08:50:04Zerologon," CVE-2020-1472 is an elevation of privilege vulnerability affecting multiple Microsoft Windows Server op… https://t.co/wKHmNjj6PP https://twitter.com/i/web/status/1307964370635427842argevise
2020-09-21 08:40:06#SecurityAlert: The Zerologon Vulnerability Exploration (CVE-2020-1472) could allow attackers to gain control of a… https://t.co/VlQMcRtSnv https://twitter.com/i/web/status/1307960525171683328KedronUK
2020-09-21 08:40:05'CVE-2020-1472', våbentliggjort med offentlig tilgængelig kode. https://t.co/56qSpR9g2K https://success.trendmicro.com/solution/000270328DCIS_SUND
2020-09-21 08:40:04CISA Warning: Patch your Windows Servers against CVE-2020-1472 (Zerologon) https://t.co/5Da4AKud8B #Security… https://t.co/YFCZmTaqlF https://borncity.com/win/?p=16016 https://twitter.com/i/web/status/1307962012559904770etguenni
2020-09-21 08:30:06CISA-Warnung: Patcht eure Windows Server gegen CVE-2020-1472 (Zerologon) https://t.co/QjNzwPitL4 #Sicherheit… https://t.co/V6dTs10hxn https://www.borncity.com/blog/2020/09/21/cisa-warnung-patcht-eure-windows-server-gegen-cve-2020-1472-zerologon/ https://twitter.com/i/web/status/1307958610866114565etguenni
2020-09-21 08:20:03A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/iTMWKcEFht https://twitter.com/i/web/status/1307956982918283264SophieFouche
2020-09-21 08:10:02Threat Brief: CVE-2020-1472, also known as "Zerologon," was given a "critical" security rating from #Microsoft and… https://t.co/3gAu1170Xn https://twitter.com/i/web/status/1307952712127053824JuanMataix
2020-09-21 07:50:03Zerologon: US-Behörden sollen Patch für CVE-2020-1472 installieren - https://t.co/eP56F3ZK6Z https://t.co/q10niYijXu https://is.gd/4LUOK9zdnet_de
2020-09-21 07:10:03A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/g4mR3MC4dC https://twitter.com/i/web/status/1307939881373569025LClefberg
2020-09-21 07:00:04Achtung! Handlungsempfehlung zur kritischen Microsoft Netlogon-Sicherheitslücke CVE-2020-1472 - weitere Infos unter… https://t.co/i58wPMrwsb https://twitter.com/i/web/status/1307937120770764801kissystemhaus
2020-09-21 06:40:02A quick post about Zerologon vulnerability (CVE-2020-1472). Patch your Windows domain controllers #Zerologon https://t.co/XClqNEQXhW https://ptrace.net/articles/2020-09/zerologind3b4g
2020-09-21 06:10:10Hijacking a Domain Controller with Netlogon RPC (aka Zerologon: CVE-2020-1472) https://t.co/g8sN5CyUoW… https://t.co/4LkG6WEyrz https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hijacking-a-domain-controller-with-netlogon-rpc-aka-zerologon-cve-2020-1472/ https://twitter.com/i/web/status/1307923295543742465ptracesecurity
2020-09-21 05:30:03Kiberdrošības pētnieki ir izlaiduši Windows Zerologon CVE-2020-1472 ievainojamības ekspluatējumus, kas ļauj uzbrucē… https://t.co/PPQpCM2igQ https://twitter.com/i/web/status/1307913217293856768AntiVirusLV
2020-09-21 05:20:04#Zerologon lets hackers to completely compromise a DC by exploiting the CVE-2020-1472. Roll the patches if it hasn'… https://t.co/VgFc4iNCgf https://twitter.com/i/web/status/1307908268321366016ramadji
2020-09-21 03:20:03CVE-2020-1472: El exploit Netlogon que brinda control completo de su sistema Windows a los hackers fácilmente. Parc… https://t.co/1k2g9sqecB https://twitter.com/i/web/status/1307881745816137728MDmanfredi
2020-09-21 03:20:02If you patched your DC's for CVE-2020-1472 but didn't apply the Registry subkey, you're STILL vulnerable. HKEY_LO… https://t.co/sXqUOuJDg8 https://twitter.com/i/web/status/1307882105385304065aprilmardock
2020-09-21 01:00:03CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/lB32eN0xtf http://ow.ly/Gje1102n7zUSergio_Pilla
2020-09-21 00:40:03Update ASAP - Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 | CISA https://t.co/2fKREzwSOs https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472TheBrothersWISP
2020-09-20 23:30:03#ICYMI Protecting Domain Controllers from CVE-2020-1472 #Zerologon and Other Zero-Day Vulnerabilities… https://t.co/xP9K4XEi83 https://twitter.com/i/web/status/1307821880108228608jc_vazquez
2020-09-20 23:00:03CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft re… https://t.co/JyKUz3Al35 https://twitter.com/i/web/status/1307816648498446342grant_consultin
2020-09-20 18:30:07CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-20 18:30:06Regla de Snort/Suricata para detectar ataques de tipo Zerologon (CVE-2020-1472) en la red: https://t.co/vxgFRYr3Fs https://gist.githubusercontent.com/silence-is-best/435ddb388f872b1a2e332b6239e9150b/raw/8064d33f62d5983130d3d946aac28ea00aaf6c4a/gistfile1.txtpcolomes
2020-09-20 18:20:02There's also a snort rule to detect CVE-2020-1472 Zerologon that would be of use to #BlueTeam https://t.co/AT0rwjl47P https://gist.github.com/silence-is-best/435ddb388f872b1a2e332b6239e9150bZephrFish
2020-09-20 17:10:02A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/JaWUzotFOS https://twitter.com/i/web/status/1307727993889009670jay_coley
2020-09-20 16:50:05Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/dOnLr7WgFR Via @matthieugarin https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.htmlPVynckier
2020-09-20 16:10:03Windows Zerologon Vulnerability (CVE-2020-1472) Via: https://t.co/Bny23Ns8Zd Paper: https://t.co/yfxv4cSpIx Arti… https://t.co/0FWxtSZdMo https://twitter.com/wdormann/status/1305564045282598912?ref_src=twsrc%5Etfw https://www.secura.com/pathtoimg.php?id=2055 https://twitter.com/i/web/status/1307713185055739908CKsTechNews
2020-09-20 16:00:02CVE-2020-1472, “stems from a flaw in a cryptographic authentication scheme ... which among other things can be used… https://t.co/BsC7JIpPDQ https://twitter.com/i/web/status/1307709228153409538benj_fry
2020-09-20 14:50:03Here are some rules to detect CVE-2020-1472 exploitation. #CVE20201472 #zerologon #suricata #suricatarules https://t.co/IPPhsZ3tNyk1dr3k
2020-09-20 14:50:03Emergency Directive 20-04 https://t.co/3EZHpE8OGx Zerologin(CVE-2020-1472)に関して発令 https://cyber.dhs.gov/ed/20-04/nekochanSec555
2020-09-20 14:00:03Threat Brief: CVE-2020-1472, also known as "Zerologon," was given a "critical" security rating from Microsoft and a… https://t.co/HL6e8J0Bnb https://twitter.com/i/web/status/1307680920799977475Candy_Vonk
2020-09-20 11:40:04CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller… https://t.co/KQvqmbnm5J https://twitter.com/i/web/status/1307643191538200581hintz2010
2020-09-20 09:30:02Detecting CVE-2020-1472 Using Splunk Attack Range #splunkBlogsnetsocialty
2020-09-20 08:40:03CVE-2020-1472 https://t.co/1O0b7MYVdTfiller
2020-09-20 08:10:04Read my Sep 20 'Gestion des Risques/I.E.' Newsletter featuring “Detecting CVE-2020-1472 Using Splunk Attack Range” https://t.co/YE8AOCstRL https://nzzl.us/TDYwH7wBelinOlivier
2020-09-20 07:50:09CVE-2020-1472 | Netlogon の特権の昇格の脆弱性 https://t.co/kqEIIrWzjg https://t.co/gF9jjvwt74 http://izumino.jp/Security/sec_trend.cgi?ref=tw&ref_date=2020-09-20%2016%3A40 https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2020-1472sec_trend
2020-09-20 07:10:03USA emite directiva de emergencia para que los organismos federales respondan a CVE-2020-1472, con fechas límite. ¿… https://t.co/ARWVpIQbOK https://twitter.com/i/web/status/1307575252084502530ProtAAPP
2020-09-20 06:10:02Detecting CVE-2020-1472 Using... #Splunk #Microsoft #cyberdefense #cybersecurity https://t.co/VsSq8orvZ5 https://lnkd.in/eiWT6R5peterdiaz33
2020-09-20 05:30:03Sprocket Security - Blog - How to exploit Zerologon (CVE-2020-1472) https://t.co/Qs3FZ7oVKJ https://www.sprocketsecurity.com/blog/how-to-exploit-zerologonSebydeBV
2020-09-20 04:20:02CVE-2020-1472, as serious as it gets, hence the maximum 10 CVSS rating & the critical severity that Microsoft has a… https://t.co/MqlDgevR6B https://twitter.com/i/web/status/1307534162010677249holisticinfosec
2020-09-20 03:40:03All services will be down for about 15 minutes for patches and maintenance to fix CVE-2020-1472, as required by the… https://t.co/b7Bv180GbB https://twitter.com/i/web/status/1307522850140676096InnovationInc_
2020-09-20 03:40:03GitHub Trending Archive, 18 Sep 2020, Python. VoidSec/CVE-2020-1472, bb00/zer0dump, DataSC3/No-BlackM, center-for-t… https://t.co/PW1PJvIBSh https://twitter.com/i/web/status/1307522388704149505motakasoft
2020-09-20 01:10:03Did you patch your windows servers already? CVE-2020-1472 https://t.co/GOT77AtMOR https://twitter.com/Forbes/status/1307481190820175880naojsamot
2020-09-20 01:10:03Today's #FeaturedPost on https://t.co/o8p81DnL1w "CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow… https://t.co/1jjmxEyelr http://linksfor.dev https://twitter.com/i/web/status/1307486107009863680linksfordevs
2020-09-20 00:40:03GitHub Trending Archive, 18 Sep 2020, All. spawnfest/bakeware, SecuraBV/CVE-2020-1472, sdushantha/tmpmail, microsof… https://t.co/wO1M51b0qU https://twitter.com/i/web/status/1307477114279477248motakasoft
2020-09-20 00:30:02New Emergency Directive - CVE-2020-1472 affecting Microsoft Windows Netlogon Remote Protocol https://t.co/SmFFZVM0ab https://us-cert.cisa.gov/ncas/current-activity/2020/09/18/cisa-releases-emergency-directive-microsoft-windows-netlogonCBrustin
2020-09-19 23:40:02Pretty scary Windows Server vulnerability that requires immediate attention. CVE-2020-1472 https://t.co/89Euevvb0v https://www.cisa.gov/blog/2020/09/18/windows-server-vulnerability-requires-immediate-attentionm_simpson
2020-09-19 20:40:03Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/k6AKz0NNjs https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.htmlDan_Suciu
2020-09-19 18:30:06CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-19 17:10:05The big news this week is the huge flaw in Microsoft’s Active Directory, CVE-2020-1472 (whitepaper). Netlogon… https://t.co/xgLBfvm8oh https://twitter.com/i/web/status/1307363857413763073coolartspinner
2020-09-19 16:30:03Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/kblRHR7OPr https://buff.ly/2FRIvRfpcastagnaro
2020-09-19 15:10:11#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/8pC9dEJT3H https://twitter.com/i/web/status/1307335174385004544deepwatch_sec
2020-09-19 14:10:02Nová Samba řeší CVE-2020-1472 s CVSS 9.8 https://t.co/IWPiGNPvMN http://www.abclinuxu.cz/zpravicky/nova-samba-resi-cve-2020-1472-s-cvss-9.8abclinuxu
2020-09-19 14:00:06First stab at a #snort / #suricata rule to match #mimikatz #CVE-2020-1472 #Zerologon using NetrServerAuthenticate2:… https://t.co/yvFP2R9L4y https://twitter.com/i/web/status/1307316396661993474James_inthe_box
2020-09-19 12:30:03Wow @CISAgov has issued an emergency alert for CVE-2020-1472 (Windows Netlogon Remote Protocol) there are a several… https://t.co/XByUQzwdmD https://twitter.com/i/web/status/1307294908391268352uuallan
2020-09-19 12:20:03Micropatch for #Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/kK25n5AoPh https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.htmlAnastasis_King
2020-09-19 10:20:02Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/niawjR6Gwk https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.htmlSecnewsbytes
2020-09-19 09:50:04"Zerologon," CVE-2020-1472 is an elevation of privilege vulnerability affecting multiple Microsoft Windows Server o… https://t.co/1K4eEKEUf0 https://twitter.com/i/web/status/1307253604462596098Unit42_Intel
2020-09-19 09:50:02Detecting #CVE-2020-1472 using #Splunk Attack Range https://t.co/OUtzkY4Igw https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.htmlSteve_rt1
2020-09-19 08:50:03Instantly become #domain #admin by subverting #Netlogon #cryptography (CVE-2020-1472) https://t.co/FRLnQCVQK2 https://www.secura.com/blog/zero-logonDrWamala
2020-09-19 08:10:05Detecting CVE-2020-1472 Using #Splunk #Attack #Range #splunkBlogs #CyberSecurity #linux #system #Vulnerability… https://t.co/QVIQtawLJe https://twitter.com/i/web/status/1307228251962699777Cobadisec
2020-09-19 07:00:06The DHS has issued an emergency directive requiring, in law, that federal agencies patch CVE-2020-1472 aka Zerologo… https://t.co/7yXSwtunaW https://twitter.com/i/web/status/1307211440751882241GossiTheDog
2020-09-19 07:00:06A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/cMREeHWCsw https://twitter.com/i/web/status/1307211060747870210radiceu
2020-09-19 06:10:05CISAがCVE-2020-1472(Netlogon特権昇格の脆弱性)について、緊急司令(Emergency Directive (ED))20-04 を出した。 https://t.co/O2wV341nlS https://us-cert.cisa.gov/ncas/current-activity/2020/09/18/cisa-releases-emergency-directive-microsoft-windows-netlogonhogehuga
2020-09-19 06:10:02Although Microsoft provided patches for CVE-2020-1472 in August 2020, unpatched systems will be an attractive targe… https://t.co/lwPTw12PjA https://twitter.com/i/web/status/1307199227102138370aburassen2
2020-09-19 04:20:04Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/I2NlOwsNn2 https://t.co/MDOxb7m8mA http://newsbythehour.org/cybr http://bit.ly/3mqxGXaeverythingcybr
2020-09-19 03:40:07GitHub Trending Archive, 17 Sep 2020, Python. VoidSec/CVE-2020-1472, bb00/zer0dump, center-for-threat-informed-defe… https://t.co/x1m5RNHeHo https://twitter.com/i/web/status/1307160001878745088motakasoft
2020-09-19 03:40:06GitHub Trending Archive, 17 Sep 2020, Python. davidbau/rewriting, B16f00t/whapa, dirkjanm/CVE-2020-1472, TophantTec… https://t.co/mZUxb9rn6o https://twitter.com/i/web/status/1307160023890419713motakasoft
2020-09-19 03:40:05Don’t let an attacker compromise your Active Directory. Protect your operating system from CVE-2020-1472 and read a… https://t.co/YR95DgjucI https://twitter.com/i/web/status/1307160834448199680USCERT_gov
2020-09-19 03:30:04Zerologon (CVE-2020-1472) について CISA が緊急指令を出しましたね。。 / CISA Releases Emergency Directive on Microsoft Windows Netlogo… https://t.co/Gs2kZ6caBJ https://twitter.com/i/web/status/1307158538297303041masmasjp
2020-09-19 03:20:11Technical details of CVE-2020-1472 Zerologon https://t.co/I2NlOwsNn2 https://t.co/gP6akOE5pE http://newsbythehour.org/cybr http://bit.ly/everythingcybr
2020-09-19 03:20:05CVE-2020-1472—affecting Microsoft Windows Netlogon Remote Protocol is critical enough to patch right now for CISA t… https://t.co/q4Fe9x0OvM https://twitter.com/i/web/status/1307156211012231168IanBarwise
2020-09-19 03:10:04Don’t let an attacker compromise your Active Directory. Protect your operating system from #CVE-2020-1472 and read… https://t.co/0LhnoVrmo8 https://twitter.com/i/web/status/1307154417712590850USCERT_gov
2020-09-19 02:50:03Detecting CVE-2020-1472 Using Splunk Attack Range https://t.co/FWX4YJdl0G https://t.co/Q8GREdKGnE http://dlvr.it/Rgw2wJgrant_bassett
2020-09-19 02:40:03[WARNING| #zerologon (CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE exploit the wil… https://t.co/j9yy5PUCfv https://twitter.com/i/web/status/13071473463593123873XS0
2020-09-19 02:20:03[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/C5ZEoPRlwC by @securabv https://hubs.la/H0wxpz80TyrannosaurJen
2020-09-19 00:40:03GitHub Trending Archive, 17 Sep 2020, All. deepklarity/jupyter-text2code, SecuraBV/CVE-2020-1472, microsoft/onefuzz… https://t.co/AVRiBmHCqO https://twitter.com/i/web/status/1307114725256425472motakasoft
2020-09-19 00:20:04What an amazing effort 👏 from the team to get these @splunk detections 🛡 out for #Zerologon CVE-2020-1472.… https://t.co/ocMNsvYBK0 https://twitter.com/i/web/status/1307109999005626369d1vious
2020-09-19 00:00:05Detecting CVE-2020-1472 (Zerologon) Using Splunk Attack Range #splunkBlogs https://t.co/uvUtFiNZaz #splunk #splunkthreatresearch https://www.splunk.com/en_us/blog/security/detecting-cve-2020-1472-using-splunk-attack-range.htmlrodsoto
2020-09-18 23:40:04“0patch Blog: Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472)” https://t.co/FuxKsq3rah https://htn.to/rjbqqSFyNEwaiha8
2020-09-18 21:40:04A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/pdDcxoPIpu https://twitter.com/i/web/status/1307070660938784768sdemarzio75
2020-09-18 20:40:03A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/9hTCcYuBaV https://twitter.com/i/web/status/1307056031814516736Eddiecarvallo
2020-09-18 20:30:06CVE-2020-1472 hakkında teknik bir makale yayınladı ve zafiyet “Zerologon” olarak isimlendirildi. Windows sunucuları… https://t.co/nLVAleZieb https://twitter.com/i/web/status/1307052207683055621teknokizilelma
2020-09-18 20:20:03CVE-2020-1472 hakkında teknik bir makale yayınladı ve zafiyet “Zerologon” olarak isimlendirildi. #microsoft… https://t.co/mYWxaM3fs2 https://twitter.com/i/web/status/1307050635590799362yakupcontarli
2020-09-18 20:00:03#CVE20201472 just coz i wanna be in someone's CTI feed :P #CVE-2020-1472 CVE-2020-1472 https://t.co/PQ43ISbkjmUK_Daniel_Card
2020-09-18 19:40:05Are all your DCs already patched against Zerologn (CVE-2020-1472)? Check out this simplified overview of the critic… https://t.co/OFtqsPLvkV https://twitter.com/i/web/status/1307039350476214277simakov_marina
2020-09-18 18:50:16ZeroLogon Attack [CVE-2020-1472] for Red and Blue Team. Perform Purple Teaming activity by Simulating & Detecting… https://t.co/PAf5pvJrI4 https://twitter.com/i/web/status/1307027710770724864cyberwarfarelab
2020-09-18 18:30:07CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-18 18:10:03#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/MnzQJJecWh https://twitter.com/i/web/status/1307018281094651905deepwatch_sec
2020-09-18 17:50:03CVE-2020-1472, a vulnerability affecting Microsoft Windows Netlogon Remote Protocol. #Anonymous… https://t.co/kJGbpJK7Pa https://twitter.com/i/web/status/1307013528952471557AnonAnonymous
2020-09-18 17:50:03Zerologon Proof of Concept Code Available for CVE-2020-1472 (Windows Netlogon Elevation of Privilege):… https://t.co/xK3I6w9NXn https://twitter.com/i/web/status/1307013481397448706FortiGuardLabs
2020-09-18 17:30:07Here we are with #zerologon / CVE-2020-1472, now: Challenge / Response / Password and even result codes are encrypt… https://t.co/reytT1PqYA https://twitter.com/i/web/status/1307007546167787523gentilkiwi
2020-09-18 17:20:02Critical Vulnerabilities in Microsoft Windows Netlogon Remote Protocol (MS-NRPC) CVE-2020-1472. See the… https://t.co/NsGquXCumK https://twitter.com/i/web/status/1307005915162443777ncsc_gov_ie
2020-09-18 16:50:24A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/1dR14UfyYt https://twitter.com/i/web/status/1306997407469707265jzupon
2020-09-18 16:40:04#fridayreads #blogging Patch alert! With a CVSS score of 10, Zerologon (CVE-2020-1472) is one of the most critical… https://t.co/YmiSv6V38S https://twitter.com/i/web/status/1306994760712814593preemptsecurity
2020-09-18 16:00:04Threat Brief: Microsoft Vulnerability CVE-2020-1472 “Zerologon” https://t.co/b8p1lqhZSZ https://unit42.paloaltonetworks.com/zerologon/PVynckier
2020-09-18 15:50:25A new CVE was released recently that has made quite a few headlines – CVE-2020-1472. #Zerologon, may allow an attac… https://t.co/gyxHEjeUEc https://twitter.com/i/web/status/1306981559677919234joymedellin
2020-09-18 15:40:03La détection de la CVE-2020-1472 (#Zerologon) a été ajouté à la box #Sherlock. Ça passe bientôt en prod chez nos cl… https://t.co/t1qSQpndQj https://twitter.com/i/web/status/1306979353864142855Prohacktiv3
2020-09-18 15:40:02Just added a PR on ade (ActiveDirectoryEnum) that adds imbedded exploits to the mix. First one is CVE-2020-1472 tes… https://t.co/v7b6iIpPTb https://twitter.com/i/web/status/1306980512095821824CasperGN
2020-09-18 15:30:03Vulnerabilidad crítica de escalación de privilegios sobre NetLogon (MS-NRPC) CVE-2020-1472 #ciberseguridad… https://t.co/BqmOc4ugqs https://twitter.com/i/web/status/1306978677473902592soc_datasec
2020-09-18 15:10:04CVE-2020-1472 is a new exploit nicknamed 'Zerologon', which exists in Windows' Netlogon that could allow attackers… https://t.co/IAcKYfkVue https://twitter.com/i/web/status/1306971501627953154AtlasCybersec
2020-09-18 14:50:16Want verify patches for CVE-2020-1472 have been applied to your DC's? Run: get-hotfix -id KB4571702 -ComputerNam… https://t.co/X8lggvaeLU https://twitter.com/i/web/status/1306966640450510852XSSinar
2020-09-18 14:50:15[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/m41r1OLuJJ https://www.secura.com/blog/zero-logontimyardley
2020-09-18 14:40:05CVE-2020-1472 - MS Netlogon - Parchar lo antes posible!!! https://t.co/7J23rvhrrD @puntonetsol #cve https://us-cert.cisa.gov/ncas/current-activity/2020/09/17/certcc-releases-information-critical-vulnerability-microsoftegdutra
2020-09-18 14:00:04'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/HamkpWHnXy https://twitter.com/i/web/status/1306954552722092032Art_Capella
2020-09-18 14:00:03'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/Ld0SI9vHzP https://twitter.com/i/web/status/1306954943266304000Art_Capella
2020-09-18 13:40:07CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @JennaMagius developed one of the first publicl… https://t.co/uE2qnwtUAi https://twitter.com/i/web/status/1306948667564326912RiskSense
2020-09-18 13:20:02Things like #CVE-2020-1472 are what keep me passionate about my career in #Cybersecurity. https://t.co/epW0ACIBe9 https://www.secura.com/pathtoimg.php?id=2055jasonhillva
2020-09-18 12:00:08Detect vulnerable Netlogon connections (event id 5829) , indicates possible CVE-2020-1472 / #Zerologon attempts… https://t.co/tdGvWkssl7 https://twitter.com/i/web/status/1306924410213892097cudeso
2020-09-18 11:40:06La #vulnerabilidad CVE-2020-1472 amenaza a los controladores de dominio https://t.co/eEtdyubkCW #Zerologon https://t.co/lau5r5myb5 https://kas.pr/qdc2KasperskyES
2020-09-18 10:20:030patch Blog: Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/8iXAUoENgq https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.htmltais9
2020-09-18 09:30:07Micropatch for #Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/kK25n5AoPh https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.htmlAnastasis_King
2020-09-18 09:30:05CVE-2020-1472 ZeroLogon Remote Code Execution. 🔥 https://t.co/KCYRofzfAe https://t.co/FHXpYuPSbH https://t.co/PZxFgNuat7 https://github.com/dirkjanm/CVE-2020-1472 https://www.secura.com/blog/zero-logon https://twitter.com/vFeed_IO/status/1305535281655885825sec715
2020-09-18 09:30:04เดี๋ยวลงยาว ๆ อีกที มี Hacker พบและใช้งานช่องโหว่ Netlogon (CVE-2020-1472) ส่งผลให้ Linux Samba 4.8 ลง ไป และ Windo… https://t.co/GWHe4YWeif https://twitter.com/i/web/status/1306887578642083840mungship
2020-09-18 09:30:03⚠️Alerte CERT-FR⚠️ Samba configuré comme contrôleur de domaine est également vulnérable à CVE-2020-1472 CERTFR-202… https://t.co/VeV9dwkHrs https://twitter.com/i/web/status/1306888189215420417CERT_FR
2020-09-18 08:50:03[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/ZT2oPtD7Uw https://www.secura.com/blog/zero-logonSecnewsbytes
2020-09-18 08:20:04#Qualys warnt vor kritischer Schwachstelle CVE-2020-1472 aka #ZeroLogon https://t.co/qmvA3U4eTa https://www.infopoint-security.de/?p=24934ip4security
2020-09-18 08:10:03Netlogon’da Kritik Zafiyet: #Zerologon! CVE-2020-1472 kodlu zafiyet, Netlogon’un belirli bir fonksiyonundaki doğrul… https://t.co/uzMlBBvWjF https://twitter.com/i/web/status/1306867749126311936Priviasec
2020-09-18 07:40:14CVE-2020-1472 Zerologon as a Beacon Object File https://t.co/qq46MDJfLm via @YouTube https://youtu.be/zGf1Rat3rEklo0_ro
2020-09-18 07:00:05Threat Brief: Microsoft Vulnerability CVE-2020-1472 “Zerologon” https://t.co/AfOiNtb8j6 http://sco.lt/7hemZ6DidierCaradec
2020-09-18 06:30:052020年8月にMicrosoftが公開したセキュリティ更新プログラムCVE-2020-1472 Netlogonにおける特権昇格脆弱性の脅威概要を公開しました。 #Zerologon とも呼ばれる本脆弱性のCVSSスコアは10… https://t.co/PI2t1hlKew https://twitter.com/i/web/status/1306840975747223552unit42_jp
2020-09-18 06:10:03Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/V8VUAVyuXi https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.htmlDinosn
2020-09-18 05:40:05US-CERTの9/14注意喚起(CVE-2020-1472)。Netlogonの攻撃コードが出回ってます。 「Windows ServerのNetlogon Remoteプロトコルの実装で、MS-NRPCを使用してドメインコン… https://t.co/NsXAh2QhQ2 https://twitter.com/i/web/status/1306827814566592514foxbook
2020-09-18 05:40:03CVE-2020-1472 #ZeroLogon can be a nightmare for organizations. Specially in #Ransomware era #CyberSecurityjawadkhalil1
2020-09-18 05:00:032020年1月14日にサポートが終了したWindows Server 2008および2008 R2にZerologon(CVE-2020-1472)のパッチが適用できるようだけどPROライセンスが必要。 25.95 USD +ta… https://t.co/KjHzcPw7jf https://twitter.com/i/web/status/1306819164800077829RootLinks_Co
2020-09-18 04:30:04publicly available exploit code for CVE-2020-1472 📌elevation of privilege vulnerability in $MSFT Netlogon 📌unpatche… https://t.co/MfYXN5eKK8 https://twitter.com/i/web/status/1306812355590971392QContrarian
2020-09-18 04:30:03Just did an exploit for #zerologin CVE-2020-1472 and a pass-the-hash attack on a W2016 DC using Impacket. Song: Th… https://t.co/K5kbGW2co3 https://twitter.com/i/web/status/1306812458737098752THE_PALE_KALE
2020-09-18 03:40:06GitHub Trending Archive, 16 Sep 2020, Python. SecuraBV/CVE-2020-1472, yanshengjia/ml-road, xingyizhou/CenterTrack,… https://t.co/5zoUZqjozM https://twitter.com/i/web/status/1306797634867191808motakasoft
2020-09-18 03:10:03Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472) https://t.co/L7GjJsCbTT https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html?m=1yeroncio
2020-09-18 02:00:09[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/uz1TtpOSe2 https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/se_kenchan
2020-09-18 01:20:06CVE-2020-1472 usefull exploit (more than a POC) publicly available. Did you patch yet?TristanDostaler
2020-09-18 01:20:05ช่องโหว่ CVE-2020-1472 ได้รับ CVSS score อยู่ที่ 10/10 ผลกระทบ: เพิ่มสิทธิ์ของ user ที่อยู่ในเครือข่ายของ Domain… https://t.co/M7Q7wGadN6 https://twitter.com/i/web/status/1306763843394101248AwayA2u
2020-09-18 01:20:04» CVE-2020-1472:ドメインコントローラーを脅かす脆弱性 | カスペルスキー公式ブログ https://t.co/VIAww469fB https://blog.kaspersky.co.jp/cve-2020-1472-domain-controller-vulnerability/29235/yuuyuyu_ka
2020-09-18 01:20:02脅威に関する情報: マイクロソフトの脆弱性CVE-2020-1472「Zerologon」 https://t.co/S49g7hCZLb https://unit42.paloaltonetworks.jp/zerologon/fd0
2020-09-18 01:10:03ICYMI: Details on the impact of the Zerologon Vulnerability Exploration (CVE-2020-1472), how it works, and how to p… https://t.co/RivVnu8VcK https://twitter.com/i/web/status/1306762113159962625ExtraHop
2020-09-18 00:50:08A proof of concept exploit has been released for Windows Netlogon vulnerability CVE-2020-1472. We expect it to be u… https://t.co/xiC0b9v19H https://twitter.com/i/web/status/1306756076310855680NSACyber
2020-09-18 00:40:05Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/pEF7Yow9tt @jpcert https://www.jpcert.or.jp/newsflash/2020091601.htmlr1ngo5656
2020-09-18 00:20:05https://t.co/92jroITjht From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472) - You are being redirected.. https://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/1nf0s3cpt
2020-09-18 00:20:042020年8月にMicrosoftが公開したセキュリティ更新プログラムCVE-2020-1472 Netlogonにおける特権昇格脆弱性の脅威概要を公開しました。 Zerologonとも呼ばれる本脆弱性のCVSSスコアは10.0… https://t.co/lXUC2c71GR https://twitter.com/i/web/status/1306748713356980224kimidori_sec
2020-09-17 23:50:07[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/ifXKuDVnOT https://m.cje.io/3c6GigPcaseyjohnellis
2020-09-17 23:10:040patch fixt Zerologon (CVE-2020-1472) in Windows Server 2008 R2 https://t.co/4x4E4Db6A2 #0patch #Sicherheit… https://t.co/7kdsLqIQ4A https://www.borncity.com/blog/2020/09/18/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2/ https://twitter.com/i/web/status/1306729903686025216etguenni
2020-09-17 23:10:020patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2 https://t.co/YRM5WPjqPh #0patch… https://t.co/YI8L0pajNN https://borncity.com/win/?p=15977 https://twitter.com/i/web/status/1306731889961717760etguenni
2020-09-17 23:00:04Threat Brief: CVE-2020-1472, also known as "Zerologon," was given a "critical" security rating from Microsoft and a… https://t.co/iChlwGQ0sa https://twitter.com/i/web/status/1306728148629893120Unit42_Intel
2020-09-17 22:40:04From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472) - Lares https://t.co/HnD648GDuH http://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/Dan_Suciu
2020-09-17 22:20:05The Zerologon Windows domain controller vulnerability (CVE-2020-1472) is dangerous… but Trend Micro’s customers are… https://t.co/dXRdiwzPoq https://twitter.com/i/web/status/1306718561851842561EricSkinner
2020-09-17 22:20:03For a terse summary of the Windows Server Netlogon vulnerability (CVE-2020-1472) exposed this month, and how it wor… https://t.co/m8kce6iQm2 https://twitter.com/i/web/status/1306719279476125696kurmac
2020-09-17 22:00:08(CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE have been looking into this very nas… https://t.co/nHgfFPIu5V https://twitter.com/i/web/status/1306712191467270144EthanGray___
2020-09-17 21:50:03マジか、 Zerologon (CVE-2020-1472) は Samba 4.7 以前にも影響があるって・・! https://t.co/OGZ6DckCDK https://twitter.com/wdormann/status/1305908429664419840rough_and_cheap
2020-09-17 21:50:03(CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE have been looking into this very nas… https://t.co/M4IL6zNmRt https://twitter.com/i/web/status/1306711832132857856EthanGray___
2020-09-17 21:50:02New post: Threat Brief: Microsoft Vulnerability CVE-2020-1472 “Zerologon” https://t.co/hq3TtMuvS1 https://reportcybercrime.com/threat-brief-microsoft-vulnerability-cve-2020-1472-zerologon/digitpol_cyber
2020-09-17 21:40:07ZeroLogon - Owning HTB machines with CVE-2020-1472 https://t.co/8qgNCcnmks https://0xdf.gitlab.io/2020/09/17/zerologon-owning-htb-machines-with-cve-2020-1472.htmlhackplayers
2020-09-17 21:40:05Threat Brief: Microsoft Vulnerability CVE-2020-1472 “Zerologon” https://t.co/x2HbXvF9pz #CVE20201472 #vulnerability… https://t.co/Y3SaCYz7Za http://dlvr.it/RgqgLH https://twitter.com/i/web/status/1306708271231688704blueteamsec1
2020-09-17 21:30:05CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/pT7SisAHea https://twitter.com/i/web/status/1306705399123341312RiskSense
2020-09-17 21:10:03#microsoft | #microsoftsecurity | Microsoft Netlogon Elevation of Privilege Vulnerability [CVE-2020-1472] https://t.co/nS6DgoamCq https://nationalcybersecuritynews.today/microsoft-microsoftsecurity-microsoft-netlogon-elevation-of-privilege-vulnerability-cve-2020-1472/NcsVentures
2020-09-17 20:50:03#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/zFZPRrc2f8 https://twitter.com/i/web/status/1306696214663041024deepwatch_sec
2020-09-17 20:30:07Microsoft Netlogon Elevation of Privilege Vulnerability [CVE-2020-1472] https://t.co/2ELfnxc346 https://www.systemtek.co.uk/2020/09/microsoft-netlogon-elevation-of-privilege-vulnerability-cve-2020-1472/6townstechteam
2020-09-17 20:30:07Microsoft Netlogon Elevation of Privilege Vulnerability [CVE-2020-1472] https://t.co/F493yLbbHo https://www.systemtek.co.uk/2020/09/microsoft-netlogon-elevation-of-privilege-vulnerability-cve-2020-1472/SystemTek_UK
2020-09-17 20:30:06Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/4HWJMyMFE7 https://lnkd.in/dyTHHWTmassilanzi
2020-09-17 20:30:04Critical #vulnerability #Zerologon, CVE-2020-1472, with severity score of 10 was fixed by #Microsoft last month.… https://t.co/42EYlyrCg1 https://twitter.com/i/web/status/1306690884617019398SecPod
2020-09-17 20:20:06Micropatch for Zerologon (CVE-2020-1472) https://t.co/uLvuztxrO8 #appsec #security #secops https://ift.tt/2ZMOT36rtcz_io
2020-09-17 20:20:05¿qué es #Zerologon? #CVE-2020-1472 es resultado de un defecto en el esquema de autentificación criptográfico del p… https://t.co/bilI1BBNRl https://twitter.com/i/web/status/1306687549759520768grevelo1
2020-09-17 20:20:04Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/c46gpNjXVz #CERT #CyberSecurity #InfoSec #SOC #TousSecNum https://bit.ly/2RzY822cyberdian_cert
2020-09-17 20:20:04¿Quién es vulnerable? El CVE-2020-1472 supone un riesgo para las empresas cuyas redes están basadas en los controla… https://t.co/TxHnlcRqg0 https://twitter.com/i/web/status/1306687558525554688grevelo1
2020-09-17 20:10:06Are you protected from #Zerologon (CVE-2020-1472) attacks? https://t.co/2M19py6Z1E https://t.co/LfeiZTl3NC https://hubs.la/H0wtY5_0CoreSecurity
2020-09-17 20:10:06#Microsoft's patch for the CVE-2020-1472 vulnerability in the Netlogon protocol aka Zerologon is an update you shou… https://t.co/7np22Yd0sW https://twitter.com/i/web/status/1306684615197892615kaspersky
2020-09-17 20:10:04What does the #Zerologon (CVE-2020-1472) attack look like? Core Security's Raphael Mudge demonstrates with our Coba… https://t.co/pZZOm3RPq0 https://twitter.com/i/web/status/1306685831831265280CoreSecurity
2020-09-17 19:30:05Here is a #PowerShell implementation of #ZeroLogon (CVE-2020-1472) since everyone else has released POCs. This is a… https://t.co/7erHXxt4CH https://twitter.com/i/web/status/1306675527080718339techlazy_msft
2020-09-17 19:10:05Adversaries love Cobalt Strike. More on CVE-2020-1472 here: https://t.co/iPRvMscFO5 https://blog.cobaltstrike.com/2020/09/17/beacon-object-file-adventures-some-zerologon-smbghost-and-situational-awareness/brgarnett
2020-09-17 18:50:22There seems to be quite some questions and confusion about the impact of exploiting Zerologon (CVE-2020-1472) on th… https://t.co/UI8X4hGPGX https://twitter.com/i/web/status/1306665053299634176argevise
2020-09-17 18:40:13Micropatch for Zerologon (CVE-2020-1472) https://t.co/Xqd9uA3awy http://hrbt.us/212690hardreboot
2020-09-17 18:40:12CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/rhoqw8PsFw https://twitter.com/i/web/status/1306661816563650560RiskSense
2020-09-17 18:30:10CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-17 18:30:10⚡️#0patchTeam📢 Micropatch for #Zerologon, the "perfect" 🪟Windows vulnerability (CVE-2020-1472)👉… https://t.co/sjjnJ218QS https://twitter.com/i/web/status/1306659932046069760WZorNET
2020-09-17 18:30:09CVE-2020-1472 | Vulnerabilidad de elevación de privilegios de Netlogon. Un atacante no autenticado podría aprovecha… https://t.co/moRvLytDmt https://twitter.com/i/web/status/1306660189291114496veronicabp_
2020-09-17 18:30:07Más sobre cómo detectar la explotación de ZeroLogon (CVE-2020-1472). https://t.co/UEjNaCb5tu http://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ProtAAPP
2020-09-17 18:30:03CERT/CC Releases Information on Critical Vulnerability in Microsoft Windows Netlogon Remote Protocol CVE-2020-1472… https://t.co/4mz1SYilBT https://twitter.com/i/web/status/1306661438124036096z3roTrust
2020-09-17 18:20:05⚠️Researchers have released exploits for the Windows #Zerologon CVE-2020-1472 #vulnerability that allow an attacker… https://t.co/v0EJj4axRV https://twitter.com/i/web/status/1306657175847215109InferSight
2020-09-17 18:00:09New post: "Micropatch for Zerologon (CVE-2020-1472)" https://t.co/Pui2dfByqj https://ift.tt/3iJv2t9Myinfosecfeed
2020-09-17 18:00:04Zerologon (CVE-2020-1472,) – hacking Windows servers with a bunch of zeros Info: - Already patched with Aug. updat… https://t.co/UXviuBclrZ https://twitter.com/i/web/status/1306653578745053184CKsTechNews
2020-09-17 18:00:03Micropatch for Zerologon (CVE-2020-1472) https://t.co/1GG18i6FKd https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.html_r_netsec
2020-09-17 17:50:14CVE-2020-1472, or #Zerologon, is a great example of the value of virtual patching featured in our products. Here's… https://t.co/QuoEriKAQc https://twitter.com/i/web/status/1306649741195960321TrendMicro
2020-09-17 17:50:13Check out CERT/CC’s latest Vuln. Note for information on CVE-2020-1472, a vulnerability in Microsoft’s Netlogon. An… https://t.co/ALavHOE2ME https://twitter.com/i/web/status/1306649744316477443USCERT_gov
2020-09-17 17:50:10'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/UxDHcjDgkx https://twitter.com/i/web/status/1306650390700589056lizbeth_plaza
2020-09-17 17:50:08CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft re… https://t.co/FHMC5URsAk https://twitter.com/i/web/status/1306650549119406080lizbeth_plaza
2020-09-17 17:40:02For those interested in how Microsoft fixed CVE-2020-1472 ("Zerologon") https://t.co/HPHnGmfsaj https://blog.0patch.com/2020/09/micropatch-for-zerologon-perfect.htmlmkolsek
2020-09-17 17:30:05If you have set up detections for #zerologon (CVE-2020-1472), don't forget that it could also be exploited over SMB… https://t.co/FAwNILtQ1K https://twitter.com/i/web/status/1306644600258523137ZeroNetworks
2020-09-17 17:20:05Running a Windows Server that is vulnerable to CVE-2020-1472 ("Zerologon") but cannot apply the official update for… https://t.co/i46C2J7fzv https://twitter.com/i/web/status/13066433646668472330patch
2020-09-17 17:10:05We've just issued a micropatch for CVE-2020-1472 ("Zerologon") for Windows Server 2008 R2 without Extended Security… https://t.co/Jop3oh5lFE https://twitter.com/i/web/status/13066410133400698900patch
2020-09-17 17:00:11New blog post! 🐀 | Sentinel Query: Detect ZeroLogon (CVE-2020-1472) #sentinel #hunting #CVE20201472 #kusto… https://t.co/Hfzo9nWDUs https://twitter.com/i/web/status/1306637606202073088NVISO_Labs
2020-09-17 17:00:05This is a great article on detecting ZeroLogon (CVE-2020-1472) activity https://t.co/TFNFx1Agxs https://twitter.com/indi303/status/1306615934614794240PyroTek3
2020-09-17 16:40:11Microsoft’s August Patch Tuesday releases contained a patch for CVE-2020-1472 which can be exploited by attackers t… https://t.co/lhuGgf8Mhp https://twitter.com/i/web/status/1306632556838871043aburassen2
2020-09-17 16:30:11Samba est vulnérable à #ZeroLogon / CVE-2020-1472 et personne n'a pensé à les prévenir 😂 #0day https://t.co/12ogN6NLWP https://www.openwall.com/lists/oss-security/2020/09/17/2newsoft
2020-09-17 16:30:03Exploit code for Windows Zerologon CVE-2020-1472 released; your Windows server is at risk https://t.co/aBI6XiIRfp https://androidrookies.com/exploit-code-for-windows-zerologon-cve-2020-1472-released-your-windows-server-is-at-risk/comboupdates
2020-09-17 16:00:08Sentinel Query: Detect ZeroLogon (CVE-2020-1472) https://t.co/YHTAwCn0IX https://blog.nviso.eu/2020/09/17/sentinel-query-detect-zerologon-cve-2020-1472/Dinosn
2020-09-17 16:00:07Infosec teams the world over are panicking about CVE-2020-1472. I’m pretty sure even in orgs with a robust patch st… https://t.co/CjS2KOVQMG https://twitter.com/i/web/status/1306622131581587456miketheitguy
2020-09-17 15:50:08Jos ette ole vielä hoitaneet asiaa kuntoon: Zerologon (CVE-2020-1472) on haavoittuvuus joka mahdollistaa domain con… https://t.co/0u4qcJhLth https://twitter.com/i/web/status/1306618939229732865LeijonaSecurity
2020-09-17 15:30:04Detecting ZeroLogon CVE-2020-1472 by our inhouse detection beast @Antonlovesdnb https://t.co/2rflNHMThw Including… https://t.co/lyvWBz9HBh https://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ https://twitter.com/i/web/status/1306615934614794240indi303
2020-09-17 15:10:07Why is the #Microsoft CVE-2020-1472 #vulnerability, known as #Zerologon, so dangerous for #enterprise #security net… https://t.co/fG1A7fKB13 https://twitter.com/i/web/status/1306608879594287109securitymag
2020-09-17 15:10:06New Post: Defensive Guidance for ZeroLogon (CVE-2020-1472) - https://t.co/iY0k3T76ap Including some Splunk, Sysmon… https://t.co/5A1OTZBbns https://www.lares.com/blog/from-lares-labs-defensive-guidance-for-zerologon-cve-2020-1472/ https://twitter.com/i/web/status/1306609657797062656Antonlovesdnb
2020-09-17 15:10:04New on the Lares blog - From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472): https://t.co/v6ReOb9ycs https://buff.ly/2RAm2dZandrewsmhay
2020-09-17 15:10:04New on the Lares blog - From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472): https://t.co/CHVPXxt3nE https://buff.ly/2ZOlndnLares_
2020-09-17 15:00:04New on the Lares blog - From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472): https://t.co/kZOpVe4sUL https://buff.ly/33Bi6zkRisingCyberLLC
2020-09-17 14:50:05⚠️Researchers have released exploits for the Windows #Zerologon CVE-2020-1472 #vulnerability that allow an attacker… https://t.co/LRbVjmTuQu https://twitter.com/i/web/status/1306605110831837184ptrancyber
2020-09-17 14:50:02CVE-2020-1472 After setting network pass with NetrServerPasswordSet2, event id 4742 can be generated with Anonymou… https://t.co/TtKwts2Mnu https://twitter.com/i/web/status/1306606229721145344huntingneo
2020-09-17 14:40:13[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/3DIHq9gdsk https://www.secura.com/blog/zero-logonwalfridolopez
2020-09-17 14:40:09ZeroLogon (CVE-2020-1472) testing script https://t.co/BdMek0Khfa https://github.com/SecuraBV/CVE-2020-1472walfridolopez
2020-09-17 14:30:06Identificada como CVE-2020-1472, la falla recibió un alto puntaje según Microsoft. #hacking #Microsoft… https://t.co/ssQETM1JeT https://twitter.com/i/web/status/1306599359329562624EHCGroup
2020-09-17 14:10:05Ya está disponible en YouTube nuestro vídeo acerca de #Zerologon CVE-2020-1472 en el cual comentamos un poco en qué… https://t.co/hYTLFgUJVY https://twitter.com/i/web/status/1306594939074035715edsitrendES
2020-09-17 13:50:09Samba and CVE-2020-1472 ("Zerologon"): Posted by Douglas Bagnall on Sep 17In August, Microsoft patched CVE-2020-147… https://t.co/VEZd6i4XL9 https://twitter.com/i/web/status/1306589734295101447oss_security
2020-09-17 13:30:04Detectando la explotación de ZeroLogon (CVE-2020-1472). https://t.co/U3oevozFIt https://twitter.com/joshlemon/status/1306487256480460805ProtAAPP
2020-09-17 13:20:05Instantly elevate to Domain Admin with this dirkjanm/CVE-2020-1472 https://t.co/A2wwQ3SnD9 https://buff.ly/2E7y4Z5safepassme
2020-09-17 13:20:04Hey defenders... CVE-2020-1472/Zerologon decoy now available on PreSploit! https://t.co/5wpAt2L3Bn https://t.co/hfXiBSXQ9m http://avesnetsec.comSimoKohonen
2020-09-17 12:50:07#RT @NakedSecurity: ❗Zerologon, a.k.a CVE-2020-1472, is the big, bad bug of the week❗ Zerologon is well named - th… https://t.co/jO1mCi7IB5 https://twitter.com/i/web/status/1306573964500664320Ash_Dax
2020-09-17 12:30:04❗Zerologon, a.k.a CVE-2020-1472, is the big, bad bug of the week❗ Zerologon is well named - the bug means an attac… https://t.co/qwRdeZCmVi https://twitter.com/i/web/status/1306570901752811522NakedSecurity
2020-09-17 12:30:03CVE-2020-1472の件、影響しそうな範囲が広大で地味に効く😥 特にSambaとアプライアンス製品あたりがどうかなと。GroupPolicyで無効化しないに越したことはないので調査がね...Cryshii
2020-09-17 12:20:04⚠️Researchers have released exploits for the Windows #Zerologon CVE-2020-1472 #vulnerability that allow an attacker… https://t.co/7QS3HWPsdV https://twitter.com/i/web/status/1306567909494358018S3ConsultingLLC
2020-09-17 12:00:03Here is a #PowerShell implementation of #ZeroLogon (CVE-2020-1472) since everyone else has released POCs. This is a… https://t.co/3uaYI9u4RL https://twitter.com/i/web/status/1306563557186768896BCSecurity1
2020-09-17 11:40:05Neuigkeiten über die im August bekannt gewordene kritische Sicherheitslücke CVE-2020-1472, die jetzt als „Zerologon… https://t.co/clqB9IGqHh https://twitter.com/i/web/status/1306557475160809473SuresecureD
2020-09-17 11:20:03Sentinel Query: Detect ZeroLogon (CVE-2020-1472) https://t.co/ifsNUxV83i https://blog.nviso.eu/2020/09/17/sentinel-query-detect-zerologon-cve-2020-1472/_BlackB0x_
2020-09-17 11:10:07Detecting Zerologon (CVE-2020-1472) with Zeek: By Yacin Nadji, Corelight Security Researcher CVE-2020-1472 aka Zero… https://t.co/nDO9E2W1aF https://twitter.com/i/web/status/1306549223240867840cipherstorm
2020-09-17 11:00:04The second round of patches for Microsoft's #CVE-2020-1472 are coming in February 2021. Learn how to keep your netw… https://t.co/pNkdHNwWrb https://twitter.com/i/web/status/1306546781317148678VerSprite
2020-09-17 10:50:04CVE-2020-1472: El exploit de Netlogon que brinda control completo de su sistema Windows a los hackers fácilmente. P… https://t.co/MDOCp1qDA9 https://twitter.com/i/web/status/1306545065645559809NormanOre
2020-09-17 10:30:06Zerologon (CVE-2020-1472)やっと試せた。まじであっさり刺さる。フォレンジック的には、デフォルトの設定でセキュリテイベントログにイベントID4742で、匿名ログオンでコンピュータアカウントが変更されたログが残… https://t.co/WvsT3pOGt3 https://twitter.com/i/web/status/1306538440498974721fire_fire_2
2020-09-17 10:10:05NVISO Labs | Sentinel Query: Detect ZeroLogon (CVE-2020-1472) https://t.co/8EtBoGrw6g https://bit.ly/3ceacj9StopMalvertisin
2020-09-17 10:10:04CVE-2020-1472, Exploit Demo https://t.co/ALrh2rwR7W https://nv2lt.github.io/windows/CVE-2020-1472-Step-by-Step-Procedure/k_nu11r00t
2020-09-17 10:10:04CVE-2020-1472 - Exploit Code for CVE-2020-1472 aka Zerologon https://t.co/2uLLOyFBQN via @pythontrending https://github.com/VoidSec/CVE-2020-1472argevise
2020-09-17 09:30:04New post: PoC dla podatności Zerologon (CVE-2020-1472) na Microsoft — CERT PSE https://t.co/7FLPGMqi3B https://reportcybercrime.com/poc-dla-podatnosci-zerologon-cve-2020-1472-na-microsoft-cert-pse/digitpol_cyber
2020-09-17 09:10:06CVE-2020-1472:ドメインコントローラーを脅かす脆弱性 | カスペルスキー公式ブログ https://t.co/tVSToIivHW https://blog.kaspersky.co.jp/cve-2020-1472-domain-controller-vulnerability/29235/ohhara_shiojiri
2020-09-17 09:00:04PoC dla podatności Zerologon (CVE-2020-1472) na Microsoft https://t.co/Wym4NHCYh6 https://cert.pse-online.pl/poc-dla-podatnosci-zerologon-cve-2020-1472-na-microsoft/CERTPSE
2020-09-17 08:50:05#zerologon CVE-2020-1472 from @SecuraBV is yet another DC smashing attack. There will always be zero days, but the… https://t.co/Tp8CzI25DT https://twitter.com/i/web/status/1306513570419617792SagieSec
2020-09-17 08:40:06A new #mimikatz 🥝release with #zerologon / CVE-2020-1472 detection, exploit, DCSync support and a lots of love insi… https://t.co/NHoD4LDAIV https://twitter.com/i/web/status/1306512473114251265argevise
2020-09-17 08:40:04CVE-2020-1472 - Exploit Code for CVE-2020-1472 aka Zerologon https://t.co/xnMB9KqQA3 http://github.com/VoidSec/CVE-2020-1472pythontrending
2020-09-17 08:40:04zer0dump - Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account p… https://t.co/sY9tVt6H7U https://twitter.com/i/web/status/1306512608925814787pythontrending
2020-09-17 08:20:03Are you protected against the recent #Windows Netlogon vulnerability? CVE-2020-1472 is a privilege vulnerability wh… https://t.co/hjZIffm7fD https://twitter.com/i/web/status/1306507821203304448UKFast
2020-09-17 07:50:06Zerologon (CVE-2020-1472) が気になる今日この頃。masmasjp
2020-09-17 07:40:08CVE-2020-1472: PoC for Zerologon - all research credits go to Tom Tervoort of Secura https://t.co/jpFBLFvraH https://github.com/dirkjanm/CVE-2020-1472darksh3llGR
2020-09-17 07:30:03'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/jwFFDoTTe3 https://twitter.com/i/web/status/1306494731082366978AlicePintori
2020-09-17 07:10:08А вы пропатчили свой контроллер домена для защиты от CVE-2020-1472 с CVSS 10? https://t.co/LeM6XtZmYa https://www.kaspersky.ru/blog/cve-2020-1472-domain-controller-vulnerability/29085/Batrankov
2020-09-17 07:10:05How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 - enforcement mode i… https://t.co/TmjuQscRTn https://twitter.com/i/web/status/1306490197413113856OvidiuPismac
2020-09-17 07:00:04If you're looking for ways to detect or hunt for abuse of the new #Zerologon or CVE-2020-1472 #vulnerability, keep… https://t.co/emwk49YdJz https://twitter.com/i/web/status/1306487256480460805joshlemon
2020-09-17 06:30:05_φ(・_・ [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/67n2k5Bhpq https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/hamaaki
2020-09-17 05:10:08i have reproduced the CVE-2020-1472 zerologon vulnerability! It's an unauth RCE for Domain Controllers. i can also… https://t.co/fH9uC1prVo https://twitter.com/i/web/status/1306457949276004353EthanGray___
2020-09-17 04:50:06GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/gKkdQds4rp https://github.com/SecuraBV/CVE-2020-1472piz69
2020-09-17 04:40:07Windowsドメインコントローラーの乗っ取りを許す可能性のある、Netlogonプロトコルの脆弱性CVE-2020-1472(別名:Zerologon)について。 該当する環境をお持ちの場合はご対応を。Microsoftから出て… https://t.co/t1WTnjNTs7 https://twitter.com/i/web/status/1306450334676660226kaspersky_japan
2020-09-17 03:40:03CVE-2020-1472 Zerologon as a Beacon Object File https://t.co/6QqaJidYMv https://youtu.be/zGf1Rat3rEkMrBlackCipher
2020-09-17 03:20:05CVE-2020-1472のペンテスト、適当にひろってきたPOCでやって、DCでふぐあいがおきて死んじゃうまでがキディの見せ所ですpapa_anniekey
2020-09-17 03:10:05Detecting Zerologon (CVE-2020-1472) with Zeek https://t.co/6heGR921MO https://corelight.blog/2020/09/16/detecting-zerologon-cve-2020-1472-with-zeek/timyardley
2020-09-17 02:50:04Great explanation of impact of exploiting Zerologon (CVE-2020-1472) https://t.co/y8ruy1y9UU https://twitter.com/_dirkjan/status/1306280553281449985jessefmoore
2020-09-17 02:40:03Patch your Windows Servers ASAP - CVE-2020-1472 (Zerologon) is a privilege-escalation with CVSS score of 10 out of… https://t.co/F94fSmzXf1 https://twitter.com/i/web/status/1306422416944648192andreanolanusse
2020-09-17 02:20:05เผยช่องโหว่ร้ายแรง CVE-2020-1472 'Zerologon' ในแพตช์ Microsoft เดือนสิงหาคม แนะผู้ใช้อย่าพลาดอัปเดต https://t.co/78Rchg8niI https://www.techtalkthai.com/maximum-critical-in-ms-august-2020-patch-has-been-published/ohmohm
2020-09-17 01:40:06CVE-2020-1472 ("Zerologon") - Windows Server vuln w/ 10.0 CVSS score whitepaper #Windows #infosec #Security https://t.co/BOwU7WqAWy https://www.secura.com/pathtoimg.php?id=2055sgnn7
2020-09-17 01:30:04After a #zerologon / CVE-2020-1472 exploit, it'is possible to update the local storage of the DC password with… https://t.co/ewJPvJVTQ9 https://twitter.com/i/web/status/1306404122489491456gentilkiwi
2020-09-17 01:20:05今週になってから話題に上がってますな DCへのパッチ適用となるため、AD互換環境などの検証もお忘れなく:CVE-2020-1472:ドメインコントローラーを脅かす脆弱性 | カスペルスキー公式ブログ https://t.co/LJ7jACf04B https://itnews.org/news_resources/217415tamosan
2020-09-17 00:50:05LogStare CollectorでWindowsのイベントログがとれます(10台まで無償)ので、とりあえず管理者のログオンのログを監視することも、CVE-2020-1472(Zerologon)の1つの対策として有効かと思いま… https://t.co/WYZbi73wYS https://twitter.com/i/web/status/1306393533239013376ns_lsc
2020-09-17 00:50:03Hot on the heels of the #Zerologon vuln (CVE-2020-1472) @ynadji - a research teammate at @corelight_inc - just open… https://t.co/xLNtlZlzLz https://twitter.com/i/web/status/1306394897218322432benreardon
2020-09-17 00:30:05Vulnerabilidad crítica #zeroLogon CVE-2020-1472 permite tener acceso al Domain Controller de #Windows Urgente, apl… https://t.co/Td73YWDg0o https://twitter.com/i/web/status/1306387406065668097cesarfarro
2020-09-16 22:30:04Good thread about CVE-2020-1472 #Zerologon and it's consequences. #infosec #CyberSecurity https://t.co/ornJvI0TV4 https://twitter.com/_dirkjan/status/1306280553281449985JDouliez
2020-09-16 22:20:06Detectando la explotación de ZeroLogon (CVE-2020-1472). https://t.co/sZJC0CSsWd https://twitter.com/andriinb/status/1306280634751635458ProtAAPP
2020-09-16 21:50:07I'm keeping an eye on the CVE-2020-1472 exploit activity on Github, some changes over last days: - Additions of ex… https://t.co/IuzGEtthhq https://twitter.com/i/web/status/1306347491554713601GossiTheDog
2020-09-16 21:40:06The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.… https://t.co/MYWAiEjUjl https://twitter.com/i/web/status/1306344788904628225abd_elghani
2020-09-16 21:40:02@msftsecurity @MsftSecIntel @WindowsUpdate @msftsecresponse Dear Microsoft: The MSRC advisory for CVE-2020-1472 des… https://t.co/J4UElmlt9S https://twitter.com/i/web/status/1306346701284945925KorbenD_Intel
2020-09-16 20:40:06#SecurityAlert: The Zerologon Vulnerability Exploration (CVE-2020-1472) could allow attackers to gain control of a… https://t.co/BmvcV8OeAJ https://twitter.com/i/web/status/1306331107953176577ExtraHop
2020-09-16 20:00:07Domain Admin in 10 seconds with #zerologon / CVE-2020-1472 (CVSS:10). Whitepaper and exploits available. Patch your… https://t.co/gkunFCtMzC https://twitter.com/i/web/status/1306319757625290752rxcole
2020-09-16 20:00:04PoC released for Zerologon CVE-2020-1472. Patch, and be careful when testing it... RTF-README. https://t.co/ajPTXqIyM4 https://github.com/dirkjanm/CVE-2020-1472itsvmme
2020-09-16 19:50:06'Zerologon' vulnerability on Netlogon, also identified as CVE-2020-1472, could allow attackers to hijack Windows do… https://t.co/sX6NIhiuIW https://twitter.com/i/web/status/13063176906849320961Ivango1
2020-09-16 19:30:08New post: Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 – Kashif Ali https://t.co/ruunn2cLku https://reportcybercrime.com/exploit-for-netlogon-remote-protocol-vulnerability-cve-2020-1472-kashif-ali/digitpol_cyber
2020-09-16 19:20:08CVE-2020-1472 #security #hacking #cve https://t.co/XJ06WWU8GNtpx_mx
2020-09-16 19:10:13No te pierdas mi último artículo: CVE-2020-1472 Zerologon https://t.co/K9lNFxZlSA a través de @LinkedIn #Hacking https://www.linkedin.com/pulse/cve-2020-1472-zerologon-rafael-huam%25C3%25A1n-medinaR4Y0H4CK
2020-09-16 19:10:05นักวิจัยปล่อยตัวอย่างโค้ดโจมตีช่องโหว่ CVE-2020-1472 ที่ไมโครซอฟท์แพตช์ตั้งแต่เดือนสิงหาคม เปิดทางยึด AD https://t.co/LrheWIeNH4 https://www.blognone.com/node/118475blognone
2020-09-16 18:40:05Very good thread explaining #Zerologon exploit CVE-2020-1472 https://t.co/4t6D44UHRy https://twitter.com/_dirkjan/status/1306280553281449985manelrodero
2020-09-16 18:30:12CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-16 18:30:04Microsoft CVE-2020-1472 - ZeroLogin Verificando se o AD está vulnerável: https://t.co/dCsMMdjEsN #ZeroLogon… https://t.co/kmnxacMxPK https://github.com/SecuraBV/CVE-2020-1472 https://twitter.com/i/web/status/1306298926442651650pingshell
2020-09-16 18:00:03“Researchers have released exploits for the Windows Zerologon CVE-2020-1472 vulnerability that allow an attacker to… https://t.co/QQvllzw4em https://twitter.com/i/web/status/1306291765213683714cyberprotectgrp
2020-09-16 17:40:04Active Directory folks: if you haven't patched CVE-2020-1472 (aka Zerologon) I *strongly* recommend prioritizing p… https://t.co/d7SGDZaEXf https://twitter.com/i/web/status/1306286434488397830TomSellers
2020-09-16 17:30:06Find out how to protect domain controllers from CVE-2020-1472 #ZeroLogon and other #ZeroDay vulnerabilities using t… https://t.co/VtxdXklh0O https://twitter.com/i/web/status/1306283274088583169AttivoNetworks
2020-09-16 17:20:12We've published vulnerability note VU#490028 about Zerologon / CVE-2020-1472. Windows Domain controllers without th… https://t.co/E9r31UsDvr https://twitter.com/i/web/status/1306279825519382528certcc
2020-09-16 17:20:09There seems to be quite some questions and confusion about the impact of exploiting Zerologon (CVE-2020-1472) on th… https://t.co/WsStRS6oSC https://twitter.com/i/web/status/1306280553281449985_dirkjan
2020-09-16 17:20:08update on Zerologon attack detection for CVE-2020-1472 2 #sigma host based via audit EventLog ID 4742 & 5829 1 sigm… https://t.co/TrfJKtVwWR https://twitter.com/i/web/status/1306280634751635458andriinb
2020-09-16 17:10:10@Ancients @JennaMagius Here you go! CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst… https://t.co/OoENI80yvM https://twitter.com/i/web/status/1306276924788965377RiskSense
2020-09-16 17:10:06Zerologon CVE-2020-1472 の Microsoft のアドバイザリなんですが、8月11日のリリース時点では悪用可能性指標が何れも「2 - 悪用される可能性は低い」だったので、あのような詳細ホワイトペーパーが公開… https://t.co/aOmt0Wp8yX https://twitter.com/i/web/status/13062778437272985620x009AD6_810
2020-09-16 17:10:03CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/4iyOEOWMZo https://twitter.com/i/web/status/1306278794869833729RiskSense
2020-09-16 16:40:07La vulnerabilità CVE-2020-1472 nel protocollo Netlogon, alias Zerologon, permette ai cybercriminali di hackerare i… https://t.co/XtN72IRO3L https://twitter.com/i/web/status/1306269165053976576KasperskyLabIT
2020-09-16 16:30:06The more I read on CVE-2020-1472 ('zerologon') the more I cringe. Bad news, right up there with the DNS flaw. Glad… https://t.co/zL3MNHOEca https://twitter.com/i/web/status/1306267830426447872initinfosec
2020-09-16 16:10:05La vulnérabilité CVE-2020-1472 menace les contrôleurs de domaine https://t.co/S4oXFByFfY Vous savez quoi faire. https://liens.strak.ch/?QKefmgStrikStrak
2020-09-16 15:50:05あのサーバは多分大丈夫かな。メモはしておく RT: [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/LBe3JE3sLP https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/tsaka1
2020-09-16 15:50:03See "How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472" for building… https://t.co/2WnwQHoeXD https://twitter.com/i/web/status/1306258393833844736rodtrent
2020-09-16 15:40:04A new #attackerkb assesment on 'CVE-2020-1472 aka Zerologon' has been created by jpcastr0. Attacker Value: 5 | Expl… https://t.co/HYiPg1zCIQ https://twitter.com/i/web/status/1306254998741946369Attackerkb_Bot
2020-09-16 15:20:05The second round of patches for Microsoft's CVE-2020-1472 are coming in February 2021. Learn how to keep your netwo… https://t.co/NV0rHW8gTh https://twitter.com/i/web/status/1306249420548304896VerSprite
2020-09-16 15:20:04#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/qcC7z7FOxC https://twitter.com/i/web/status/1306249611888275458deepwatch_sec
2020-09-16 15:10:02Vulnerabilidad crítica de escalación de privilegios sobre #NetLogon (MS-NRPC) #CVE-2020-1472 #zerologon… https://t.co/0PJnfzWf7u https://twitter.com/i/web/status/1306248874038882305certuy
2020-09-16 15:00:04Have you tested yet whether you've patched correctly for Zerologon CVE-2020-1472? Download our free test tool on Gi… https://t.co/zRQHkwyU9g https://twitter.com/i/web/status/1306245729317523456SecuraBV
2020-09-16 14:30:05Microsoft Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472https://cyber.gc.ca/en/alerts/microsoft-netl… https://t.co/EJPzzQJqaD https://twitter.com/i/web/status/1306236455807782912threatmeter
2020-09-16 13:20:04CVE-2020-1472 угрожает контроллеру домена https://t.co/6EFpyY14bP https://t.co/Ki8XyYMEmY https://bit.ly/35DBzSBkilin_vr
2020-09-16 13:10:08CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/NXlUKNBfa8 http://ow.ly/qx2r102mHHEArt_Capella
2020-09-16 13:00:14Forscher haben einen funktionierenden Exploit Code für die kritische Sicherheitslücke CVE-2020-1472 entwickelt - Wi… https://t.co/dR6IpPXYHO https://twitter.com/i/web/status/1306213845766111232MakroFactory
2020-09-16 12:50:06CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller - Bl… https://t.co/LscmciepCH https://twitter.com/i/web/status/1306212521729306625SecIdSol
2020-09-16 12:50:03Two Steps to Compromise #ActiveDirectory Domain via CVE-2020-1472: 1️⃣# lsadump::zerologon /target:dc01.corp.local… https://t.co/knm87eS5zc https://twitter.com/i/web/status/1306213544585768960rimpq
2020-09-16 12:40:06When an attacker bypasses all levels and goes straight to domain admin using CVE-2020-1472. https://t.co/nbVnAFP4rU https://twitter.com/jack3l316/status/1306064534914953220hackByNumbers
2020-09-16 12:40:03As a CIO or IT leader, are you sure someone is handling vulnerability CVE-2020-1472, which lets anyone on your netw… https://t.co/yRZeU1Oqna https://twitter.com/i/web/status/1306211230336647168stenvesterli
2020-09-16 12:30:06Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を|JPCERT/CC "第三者が既に標的の組織のネットワークに侵入している場合は、本脆弱性を悪用してドメインコントローラーを掌握し、更に侵害… https://t.co/Cgp3eWLH6j https://twitter.com/i/web/status/1306207455660175360moneymog
2020-09-16 12:20:12CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller… https://t.co/e8tf1anTuT https://twitter.com/i/web/status/13062037014266183681Ivango1
2020-09-16 12:20:11CVE-2020-1472 угрожает контроллеру домена https://t.co/50ZFj1BGSq https://t.co/P98JNKf5Fy https://bit.ly/2FEY9iEkmscom3
2020-09-16 12:10:07GitHub - bb00/zer0dump: Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored mach… https://t.co/UF1c4NlSs6 https://twitter.com/i/web/status/1306201394614067202n0ipr0cs
2020-09-16 11:40:03Windows Exploit Released For Microsoft Zerologon Flaw https://t.co/Tyfd0oOcgK (CVE-2020-1472) with a CVSS score of… https://t.co/hvSbNagXm1 https://threatpost.com/windows-exploit-microsoft-zerologon-flaw/159254/ https://twitter.com/i/web/status/1306196044712153092samilaiho
2020-09-16 11:30:08Windows Zerologon PoC #exploits allow domain takeover. 😱Patch Now!😱 CVE-2020-1472 https://t.co/mjWDqwLdV4 https://www.bleepingcomputer.com/news/microsoft/windows-zerologon-poc-exploits-allow-domain-takeover-patch-now/richardjscott16
2020-09-16 11:10:11» [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/bPWAK0s9eC https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/yuuyuyu_ka
2020-09-16 11:10:09@BorisTwiet Surprised @Microsoft haven’t updated their Exploitability Assessment for CVE-2020-1472 given there are… https://t.co/Fj1JdatEC8 https://twitter.com/i/web/status/13061873372741386255niper44
2020-09-16 11:00:05Jetzt updaten: Die mit dem CVSS-Score 10 bewertete Lücke CVE-2020-1472 in Windows Server kann mittels Zerologon-Exp… https://t.co/EcSLNpd1br https://twitter.com/i/web/status/1306185711838732289TrendMicroDE
2020-09-16 10:50:10#zerologon La faille netlogon #CVE-2020-1472 est de criticité 10. Veillez patcher vos DC avec la mise a jour d'août… https://t.co/hL1BqEXkMD https://twitter.com/i/web/status/1306182184135524353itpro_tipscom
2020-09-16 10:50:05#Zerologon #vulnerability and where to find it (and solve it) #cybersecurity #kaspersky #netlogon #cve CVE-2020-1472 https://t.co/kJmhhswr4T https://lnkd.in/dYYd9cxmilvius81
2020-09-16 10:50:03#zerologon #activedirectory #Microsoft #CVE-2020-1472 - criticity level :10! Make sure to patch your domain control… https://t.co/8Q42LoQDZd https://twitter.com/i/web/status/1306183332888276994itpro_tipscom
2020-09-16 10:40:11A new #mimikatz 🥝release with #zerologon / CVE-2020-1472 detection, exploit, DCSync support and a lots of love insi… https://t.co/Mj6AkqUa7d https://twitter.com/i/web/status/1306178689630076929gentilkiwi
2020-09-16 10:40:05Mimikatz now supports detection and exploitation of CVE-2020-1472 built in. https://t.co/FSHt23gVwV https://twitter.com/gentilkiwi/status/1306178689630076929GossiTheDog
2020-09-16 10:30:06Kritische Schwachstelle in ZeroLogon Qualys macht auf die kritische Schwachstelle CVE-2020-1472 aka #ZeroLogon auf… https://t.co/1tTPHFQ4LH https://twitter.com/i/web/status/1306176661063376903netzpalaver
2020-09-16 10:20:07Researchers have released exploits for the Windows Zerologon CVE-2020-1472 vulnerability that allow an attacker to… https://t.co/FrgygkFk1F https://twitter.com/i/web/status/1306173735519637505nikolozsec
2020-09-16 10:20:07Microsoft issued in August CVE-2020-1472, a vulnerability in NetLogon service that might allow unauthenticated atta… https://t.co/jNt6BK2Du8 https://twitter.com/i/web/status/1306173724375343111Israel_Cyber
2020-09-16 10:10:03Instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) via @securabv #Cybersecurity… https://t.co/LT1Zx7gnPe https://twitter.com/i/web/status/1306171762330263552omerkaanaslim
2020-09-16 09:30:03Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/bB90myYGfF http://s.edgarbv.com/30qsharksandcaviar
2020-09-16 08:50:04Instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) #CyberSecurity #vulnerability https://t.co/3W8Tz6NLWe https://buff.ly/2FCOc57CybSec4
2020-09-16 08:30:04CVE-2020-1472 ist doch sicher schon überall gepatcht, oder? - ODER? #Zerologon #Microsoft #Security… https://t.co/5RpJ6izKjN https://twitter.com/i/web/status/1306148144170688513Team_CAIRO
2020-09-16 08:30:04CVE-2020-1472 - PoC for Zerologon - all research credits go to Tom Tervoort of Secura https://t.co/qolPLJ7TB4 http://github.com/dirkjanm/CVE-2020-1472pythontrending
2020-09-16 08:20:09CVE-2020-1472 ist doch sicher schon überall gepatcht, oder? - ODER? https://t.co/g21KCJwT4d https://www.secura.com/blog/zero-logonTeam_CAIRO
2020-09-16 08:10:04Microsoft Netlogon Vulnerability (CVE-2020-1472 – Zerologon) – https://t.co/a9t1t78kLe https://blog.qualys.com/vulnerabilities-research/2020/09/15/microsoft-netlogon-vulnerability-cve-2020-1472-zerologon-automatically-discover-prioritize-and-remediate-using-qualys-vmdrnlawarp
2020-09-16 08:10:04Windows ADやドメインコントローラとネットワーク接続が可能な状況であれば、比較的簡単に実行出来るリスクがある。 CVE-2020-1472 #Windowsドメインコントローラ #ActiveDirectory… https://t.co/ZdXJKtjm86 https://twitter.com/i/web/status/1306141792341880832cast_works
2020-09-16 08:00:06Zerologon (CVE-2020-1472)の件も含めて、2020年1月14日にサポートが終了したWindows Server 2008および2008 R2はESUライセンスが無いとパッチを適用できないのか(爆死 https://t.co/xHx8XDispm https://twitter.com/RootLinks_Co/status/1306033888536395777RootLinks_Co
2020-09-16 07:50:04“Zerologon (CVE-2020-1472), the most insane vulnerability ever!” https://t.co/PQvTiA5rVh https://lnkd.in/edvYM2Gnamikeker
2020-09-16 07:40:12CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft re… https://t.co/atcKbUfxv1 https://twitter.com/i/web/status/1306133501608042497AlicePintori
2020-09-16 07:40:08Test tool for CVE-2020-1472. ZeroLogon testing script https://t.co/4l4SdaFO1X https://github.com/SecuraBV/CVE-2020-14721337core
2020-09-16 07:30:06Kritisk sårbarhet i Netlogon. Det er kritisk sårbarhet i Windows Server kjent som Zerologon (CVE-2020-1472).… https://t.co/DwI3mHikXf https://twitter.com/i/web/status/1306131224746958848ncsc_no
2020-09-16 07:30:03お知らせ:CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」 https://t.co/IMUutimjJN https://ift.tt/32yfp1Tmagiauk
2020-09-16 07:20:03NetLogon特权提升漏洞(CVE-2020-1472) NetLogon特权提升漏洞(CVE-2020-1472) https://t.co/0RgGa9vYYx https://ift.tt/3hHkLwsthreatmeter
2020-09-16 07:10:11#Zerologon la CVE-2020-1472, mostra un Bug al protocol Netlogon que permet tornar-te instantàniament AD (administra… https://t.co/9rS3wrfCMk https://twitter.com/i/web/status/1306125674076348417carlesbrunet_
2020-09-16 07:10:07@_black_traffic_ @veorq FWIW @HostileSpectrum "Braced for arguments over whether CVE-2020-1472 was intended as a bu… https://t.co/X8ra32Rndr https://twitter.com/i/web/status/1306126664443801601daniel_bilar
2020-09-16 07:10:05Patch It - Windows #Zerologon CVE-2020-1472 vulnerability allowing attacker to take control of Windows domain https://t.co/Dy98hH5kiN https://lnkd.in/eVkj2GRMBSL_Security
2020-09-16 06:30:07CVE-2020-1472ィ…Ryu_ClairdeLune
2020-09-16 06:30:06CVE-2020-1472に関連する Netlogon セキュアチャネル接続の変更に関連するイベント ID の監視に役立つスクリプト https://t.co/b991kxLKih このスクリプトやべぇな。コードが部分的に翻訳されてて、動かない。 https://support.microsoft.com/ja-jp/help/4557233/script-to-help-in-monitoring-event-ids-related-to-changes-in-netlogonmutaguchi
2020-09-16 05:50:12Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/LX2qQeQuoy #appsec #security #secops https://ift.tt/2H4xVH8rtcz_io
2020-09-16 05:20:09【注意喚起】 Microsoft製品(Windows Server)の脆弱性について、IPAが注意喚起をしています(CVE-2020-1472)。 攻撃が行われた場合の影響が大きいため、2020年8月の月例更新プログラムを未適用の… https://t.co/RG1IEP8Cn4 https://twitter.com/i/web/status/1306100105267691521nisc_forecast
2020-09-16 05:00:04[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/AHPaxcIPMX https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/Mitsuki_Shirase
2020-09-16 05:00:04Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/JX17lelHLa @jpcert https://www.jpcert.or.jp/newsflash/2020091601.htmlMitsuki_Shirase
2020-09-16 04:10:06Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/m3C6mDgqfn http://hrbt.us/212467hardreboot
2020-09-16 04:10:03นักวิจัยทดสอบควบคุมโดเมนโดยเจาะไปยังช่องโหว่ Windows Zerologon CVE-2020-1472 ที่ทาง Microsoft ออก patch สำหรับเดือน… https://t.co/6bFNN5Gmuq https://twitter.com/i/web/status/1306082743894200322TCyberDefense
2020-09-16 04:00:03GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 - https://t.co/iYmyaxvH5i https://github.com/SecuraBV/CVE-2020-1472yuminosira
2020-09-16 03:50:04オンプレミス Active Directory 管理者はパッチをあてましょう。 [AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Respons… https://t.co/0OA6ePLite https://twitter.com/i/web/status/1306077323133812737thdy5
2020-09-16 03:20:06Microsoft Netlogon Vulnerability (CVE-2020-1472 – Zerologon) – Automatically Discover, Prioritize and Remediate Usi… https://t.co/QD9jvgAkdQ https://twitter.com/i/web/status/1306068150794948610MathWebEntry
2020-09-16 03:20:05Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/nOWd8SAxk0 @jpcert https://t.co/p9VRegA3ap https://www.jpcert.or.jp/newsflash/2020091601.html https://twitter.com/taku888infinity/status/1305728440268591111taku888infinity
2020-09-16 03:00:05New post: "Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472)" https://t.co/HnHNfcXuzA https://ift.tt/35F3Wj3Myinfosecfeed
2020-09-16 02:50:06CVE-2020-1472: Zerologon: instantly become domain admin by subverting Netlogon cryptography https://t.co/d977az2vpi… https://t.co/Uq8sdHxPF6 http://dlvr.it/RghYMm https://twitter.com/i/web/status/1306060746120257536blueteamsec1
2020-09-16 02:50:04Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を https://t.co/dcCxZJkP6i https://www.jpcert.or.jp/newsflash/2020091601.htmlohhara_shiojiri
2020-09-16 02:50:03統合版 JPCERT/CC | お知らせ:CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」 https://t.co/9fDti7MAjf #itsec_jp https://ift.tt/32yfp1Titsec_jp
2020-09-16 02:30:03Instantly become Domain Admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/2zNV5R9gJJ https://github.com/dirkjanm/CVE-2020-1472_r_netsec
2020-09-16 02:20:04お知らせ:CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」 https://t.co/ilBODhR3JO https://www.jpcert.or.jp/newsflash/2020091601.htmlmicrokeyword
2020-09-16 02:00:07CyberNewsFlash「Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を」を公開。Active Directory の管理者は、更新プログラムの適用や自組織で必要となる対応など詳細をご… https://t.co/WMZSEQh6bU https://twitter.com/i/web/status/1306049410040643584jpcert
2020-09-16 02:00:05Netlogon の特権の昇格の脆弱性 (CVE-2020-1472) への早急な対応を - jpcert (2020/09/16) https://t.co/WPeFWGwVMf https://www.jpcert.or.jp/newsflash/2020091601.htmlspread_jp
2020-09-16 01:30:04#Cybersecurity #InfoSec @buffaloverflow: 'Zerologon (CVE-2020-1472) in .NET for some execute-assembly fun.. muahah… https://t.co/im1v6D4rDz https://twitter.com/i/web/status/1306041965289631746SritaKaren
2020-09-16 01:20:03Trending News: @buffaloverflow: 'Zerologon (CVE-2020-1472) in .NET for some execute-assembly fun.. muahaha 👿😄 '… https://t.co/ShLZMva5IE https://twitter.com/i/web/status/1306039454709223426susession
2020-09-16 01:10:10CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft re… https://t.co/kOtxGhc8WY https://twitter.com/i/web/status/13060351973227724811Ivango1
2020-09-16 01:00:06[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/6UHwczBehN http://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/toshiukiii
2020-09-16 01:00:05Zerologon (CVE-2020-1472)のCVSSスコア10.0なのすげ~。CyberBrainFish
2020-09-16 01:00:03Zerologon (CVE-2020-1472)の件、取り合えず検証環境でWindowsUpdate実施したら”Attack failed”は確認できた。 でもDC再起動は深夜になるだろうな… https://t.co/7ENnbvhQYL https://twitter.com/i/web/status/1306033888536395777RootLinks_Co
2020-09-16 00:00:05Abusing CVE-2020-1472 (ZeroLogon) https://t.co/uLuKMKGion http://infinitelogins.com/2020/09/15/abusing-cve-2020-1472-zerologon/infinitelogins
2020-09-16 00:00:04Top story: @buffaloverflow: 'Zerologon (CVE-2020-1472) in .NET for some execute-assembly fun.. muahaha 👿😄 '… https://t.co/i13iIXqOKr https://twitter.com/i/web/status/1306018076501172224securitycrusade
2020-09-15 23:50:03Zerologon (CVE-2020-1472) vuln: Domain Admin privileges immediately from unauthenticated network access. Patch your… https://t.co/OHg7Q0Czj1 https://twitter.com/i/web/status/1306016811532652544kerouanton
2020-09-15 23:40:04CVE-2020-1472. Have you patched? https://t.co/uBoZh0ri7F https://arstechnica.com/?post_type=post&p=1706068Cephurs
2020-09-15 23:40:03「8月11日マイクロソフトは月例セキュリティパッチをリリース…CVE-2020-1472 Netlogon Elevation of Privilege Vulnerabilityと呼ばれる脆弱性に対する、パッチが含まれていた」… https://t.co/qMxDX9BLcb https://twitter.com/i/web/status/1306014520796762112maquino
2020-09-15 23:30:06#Zerologon: instantly become #DomainAdmin by subverting Netlogon cryptography (CVE-2020-1472) (CVSS score: 10.0)… https://t.co/sUTBrz2vO0 https://twitter.com/i/web/status/1306010218011258882alvisharding
2020-09-15 23:20:04備忘録がてら書いてみた。 Zerologon (CVE-2020-1472) について|釜山公徳 (Masanori KAMAYAMA) #note https://t.co/lYQurP3cWk https://note.com/masadaart/n/n793e1ecdb5b5masart_3
2020-09-15 23:20:04Zerologon CVE-2020-1472 ドメイン参加のPCからパスワードセットされるのかー。 https://t.co/z4FJCJCv7tdragonstar7722
2020-09-15 23:10:05Windows Server: Zerologon vulnerability (CVE-2020-1472) allows domain hijacking https://t.co/80LCnWu6e0 #Security… https://t.co/xn4HORIKjb https://borncity.com/win/?p=15841 https://twitter.com/i/web/status/1306006802472013824etguenni
2020-09-15 23:00:07Windows Server: Zerologon-Sicherheitslücke (CVE-2020-1472) erlaubt Domain Übernahme https://t.co/7NYrAdqU7g… https://t.co/zeTvLUXsec https://www.borncity.com/blog/2020/09/16/windows-server-zerologon-sicherheitslcke-cve-2020-1472-erlaubt-domain-bernahme/ https://twitter.com/i/web/status/1306002525318008832etguenni
2020-09-15 23:00:05“[CVE-2020-1472] basically allows any attacker on the local network (such as a malicious insider or someone who sim… https://t.co/8wh9n51rc8 https://twitter.com/i/web/status/1306003031071354881adrianarvizo
2020-09-15 22:20:05The CVE-2020-1472 vulnerability in the #Netlogon protocol, aka #Zerologon, lets attackers hijack a Windows domain c… https://t.co/nbi1CydLSM https://twitter.com/i/web/status/1305992810198429696GustavoColsKL
2020-09-15 22:20:04CVE-2020-1472 https://t.co/9Jq53aaSAk https://arstechnica.com/information-technology/2020/09/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched/CVEannounce
2020-09-15 22:20:03CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller… https://t.co/W86pI2K3h6 https://twitter.com/i/web/status/1305993842953318400TheCoinWarrior
2020-09-15 22:00:02“[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center” https://t.co/D8Xslf3jhY https://htn.to/wZfLh9gNhwmodokey
2020-09-15 21:50:03Y esta es importante,CVE-2020-1472 no solo por el 10 de CVSS si no por que existe exploit público y funciona...… https://t.co/elHz9GKtEQ https://twitter.com/i/web/status/1305986882686328837ESFERARED
2020-09-15 21:50:02[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/qZ31pvhbUZ http://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/freude710
2020-09-15 21:40:03Microsoft Netlogon Vulnerability (CVE-2020-1472 – Zerologon) – Automatically Discover, Prioritize and Remediate Usi… https://t.co/D9nQiZD8V3 https://twitter.com/i/web/status/1305984421489762310boardtownblast
2020-09-15 21:10:06Take note that exploiting CVE-2020-1472 (#Zerologon) can give you Domain Admin creds on the one hand - but breaks t… https://t.co/thmQtseKSF https://twitter.com/i/web/status/1305975937603981314Sam0rai
2020-09-15 21:00:06Hunting for domain controllers to mitigate the Zerologon (CVE-2020-1472) issue? Give this Rumble query a shot:… https://t.co/f55YasW3zW https://twitter.com/i/web/status/1305974053782552577RumbleDiscovery
2020-09-15 20:50:06Si @pablogonzalezpe dice esto sobre ZeroLogon (CVE-2020-1472) es que hay que parchear ya! https://t.co/z2IaOToQRl https://twitter.com/pablogonzalezpe/status/1305874055178878979ProtAAPP
2020-09-15 20:40:09Speaking about CVE-2020-1472 - Just a periodic reminder to check the ACL permissions that have been set on your DC… https://t.co/AibEiQjqVK https://twitter.com/i/web/status/1305967310491004936DebugPrivilege
2020-09-15 20:40:07That moment when the weaponized zer0day comes out during your internal audit. #CVE-2020-1472 #win #pwned… https://t.co/DahVF4gJzw https://twitter.com/i/web/status/13059676800931389455M7X
2020-09-15 20:30:07A vuln that if exploited results in a total compromise of Windows domain controllers. CVE-2020-1472 aka #ZeroLogon… https://t.co/r10IzW199M https://twitter.com/i/web/status/1305965154052513793vloquet
2020-09-15 20:20:04#Vulnerabilidad (CVE-2020-1472) nombrada como Zerologon, esta falla toma ventaja de un algoritmo criptográfico débi… https://t.co/pxSyr4t1IE https://twitter.com/i/web/status/1305964062698811392ArkaviaNetworks
2020-09-15 20:10:04Recommendations for @Microsoft #Netlogon vulnerability (CVE-2020-1472, a.k.a. #Zerologon) that allows an unauthenti… https://t.co/uVHWyAgwYf https://twitter.com/i/web/status/1305960328627322880qualys
2020-09-15 20:10:03Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/82MOG58t0B https://www.secura.com/blog/zero-logonbpreneel1
2020-09-15 20:00:04"A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit (CVE-2020-1472)." 👍… https://t.co/2ghBQU3hLb https://twitter.com/i/web/status/1305958818719899649kaynemcgladrey
2020-09-15 20:00:03Microsoft Netlogon Vulnerability (CVE-2020-1472 – Zerologon) – Automatically Discover, Prioritize and Remediate Usi… https://t.co/P1zXf94DvJ https://twitter.com/i/web/status/1305959085087420416shah_sheikh
2020-09-15 19:50:09more detection traces were uploaded to the EVTX repo for CVE-2020-1472 https://t.co/xuFuwB6lOr… https://t.co/ZbLf9GetUf https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES/blob/master/Credential%20Access/Zerologon_VoidSec_CVE-2020-1472_4626_LT3_Anonym_follwedby_4742_DC_Anony_DC.evtx https://twitter.com/i/web/status/1305955829301104640SBousseaden
2020-09-15 19:40:07PoC EXPLOIT for #CVE-2020-1472 https://t.co/H5l7zbO1Mv https://github.com/dirkjanm/CVE-2020-1472kbcboy
2020-09-15 19:20:03#PATCH CVE-2020-1472: 32 exploits sous github via GG de la faille critique #ZeroLogon Si vous couplez cela avec le… https://t.co/xa1jwBLjb9 https://twitter.com/i/web/status/1305948802663223298FabianRODES
2020-09-15 19:10:08Zer0dump is an PoC exploit/tool for abusing the vulnerabilities associated with CVE-2020-1472 (Zerologon) in order… https://t.co/eWyYc5PyrC https://twitter.com/i/web/status/1305945163949318144malwaresick
2020-09-15 19:10:07SharpZeroLogon - This is an exploit for CVE-2020-1472, a.k.a. Zerologon. This tool exploits a cryptographic vulnera… https://t.co/3KP15OVddX https://twitter.com/i/web/status/1305945513003540482malwaresick
2020-09-15 19:00:03ZeroLogon testing script - CVE-2020-1472 #CyberSecurity https://t.co/WbPrwvrVQe https://github.com/SecuraBV/CVE-2020-1472malwaresick
2020-09-15 19:00:02CVE-2020-1472: Zerologon #CyberSecurity https://t.co/obpg7e5OJe https://github.com/blackarrowsec/redteam-research/tree/master/CVE-2020-1472malwaresick
2020-09-15 18:50:03CVE-2020-1472: Zerologon Unauthenticated Domain Controller compromise of the computer account password.… https://t.co/8D8SJlWviP https://twitter.com/i/web/status/1305941744656109568jas502n
2020-09-15 18:50:03⚠️ CVE-2020-1472 Zerologon ⚠️ Vulnerabilidad crítica con un CVSS 10.0 Parche MS: https://t.co/SnR749jQSf Whitepape… https://t.co/YI3CMrb8gy https://lnkd.in/dYW6JY7 https://twitter.com/i/web/status/1305941684363157509adrianlois_
2020-09-15 18:40:11⚠️🚨IMPORTANTE LEERLO Y COMPARTIR📢 CVE-2020-1472:La vulnerabilidad ‘Zerologon’, dentro del artículo te explicamos co… https://t.co/sCD05sd7Sq https://twitter.com/i/web/status/1305936959051882496GBSolution
2020-09-15 18:40:10Last month, #Microsoft released a patch for critical vulnerability CVE-2020-1472, also known as the Zerologon vulne… https://t.co/8x5exBDIcc https://twitter.com/i/web/status/1305936963745263618kaspersky
2020-09-15 18:40:07CVE-2020-1472: The Netlogon exploit that provides complete control of your Windows system to hackers easily. Patch… https://t.co/NkVtqp2B5N https://twitter.com/i/web/status/1305938237207314433AlexaGm33043450
2020-09-15 18:30:10CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-15 18:10:082020 continues to bubble up major crypto flaws: CVE-2020-0601 ECC CryptoAPI, and now CVE-2020-1472 Zerologon RPC Ne… https://t.co/mtmIAmSVhj https://twitter.com/i/web/status/1305929767300915200modubyk
2020-09-15 18:10:06Die mit dem CVSS-Score 10 bewertete Lücke CVE-2020-1472 in Windows Server kann mittels "Zerologon" ausgenutzt werde… https://t.co/L3TCiIpHdn https://twitter.com/i/web/status/1305930582363451392DigitalDynasty4
2020-09-15 18:10:06CVE-2020-1472 Big yikesgravest0rm
2020-09-15 18:10:02#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/TUq8oQontx https://twitter.com/i/web/status/1305931764309909505deepwatch_sec
2020-09-15 18:00:03#infosec #informationsecurity #hacking #Microsoft CVE-2020-1472: The Netlogon exploit that provides complete contro… https://t.co/pGfFkHxtw6 https://twitter.com/i/web/status/1305928606770577409Webimprints
2020-09-15 18:00:02#Cibersegruidad #infosec #seguridad #hacking CVE-2020-1472: El exploit Netlogon que brinda control completo de su s… https://t.co/whQvEHSqzF https://twitter.com/i/web/status/1305928709157740544Webimprints
2020-09-15 17:50:05#CVE-2020-1472 #detection using @Zeekurity https://t.co/Yw0b5Hw0DI https://twitter.com/d1vious/status/1305917664590729216drewchurch
2020-09-15 17:20:06A @splunk detection for #Zerologon CVE-2020-1472 using Zeek RPC logs. Looking for a pattern of operations NetrServe… https://t.co/vqKOA49Iuo https://twitter.com/i/web/status/1305917664590729216d1vious
2020-09-15 17:00:04How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472… https://t.co/5Mx5rkLWJ3 https://twitter.com/i/web/status/1305913780610699264NcuIsao
2020-09-15 16:50:10Situations like CVE-2020-1472 show why it's a bad idea to go cheap on your IT.siliconundergro
2020-09-15 16:40:03New post: The CVE-2020-1472 vulnerability threatens domain controllers https://t.co/dkJbcpfO7M https://reportcybercrime.com/the-cve-2020-1472-vulnerability-threatens-domain-controllers/digitpol_cyber
2020-09-15 16:30:07CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/QQeryOW3Hu https://twitter.com/i/web/status/1305904233951244294RiskSense
2020-09-15 16:30:06Zerologon: Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/FYq397mMEs https://www.secura.com/pathtoimg.php?id=2055tomasdeml
2020-09-15 16:30:05CVE-2020-1472 (aka #Zerologon) is a great finding! but is it just in my crazy head that this seems a backdoor ?? I… https://t.co/xT58W7BXSm https://twitter.com/i/web/status/1305905187484295174pipasnacave
2020-09-15 16:20:08Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) via @tiuxo… https://t.co/DV05QLra74 https://twitter.com/i/web/status/1305901759223590915lobsters
2020-09-15 16:20:02Patchée par Microsoft en août 2020, la vulnérabilité CVE-2020-1472 surnommée Zerologon permet à un pirate de prendr… https://t.co/Qp6shzmVUK https://twitter.com/i/web/status/1305903920271695874ymoricea
2020-09-15 16:10:07Exploit code available for ‘Zerologon’ vulnerability (CVE-2020-1472) that affects Microsoft Netlogon… https://t.co/TW72upjzcj https://twitter.com/i/web/status/1305899344940408834securezoo
2020-09-15 16:10:05Just completed some last-minute updates to secure our Hacking Enterprises training labs from CVE-2020-1472… https://t.co/Nv3PCv3fT3 https://twitter.com/i/web/status/1305900340848537600insecurity_ltd
2020-09-15 16:00:05[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/dG5Xk1FFXf http://dlvr.it/RgfvS0nichii_a
2020-09-15 16:00:04[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/8SCy4y70Q3 https://buff.ly/2FCOc57kentonsmith
2020-09-15 15:50:03Zerologon (CVE-2020-1472) in .NET for some execute-assembly fun.. muahaha 👿😄 https://t.co/dP6ivamS1Hbuffaloverflow
2020-09-15 15:20:07Pop quiz: 1) Did you deploy the August MSFT #patch for CVE-2020-1472 to ALL endpoints? If yes, good. Read this art… https://t.co/c1go0HR7Xy https://twitter.com/i/web/status/1305886898150404097baramundiWORLD
2020-09-15 15:20:03CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/IyeSUPmKaU https://blog.rapid7.com/2020/09/14/cve-2020-1472-zerologon-critical-privilege-escalation/kit_kiran
2020-09-15 15:00:15CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/BsyAXL2YPj http://ow.ly/uQPM102mBrcPatent_4405829
2020-09-15 14:50:18Only 3 seconds needed. Just use 0's and you are logged on. Check your domain controllers for CVE-2020-1472 vulnerab… https://t.co/LlUssTUC4n https://twitter.com/i/web/status/1305879554192334848Michal_Jarski
2020-09-15 14:50:03Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 Attackers could exploit this vulnerability to o… https://t.co/2tuR3i8y7J https://twitter.com/i/web/status/1305881416375427075DoITSecurity
2020-09-15 14:40:06Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) (via @SecuraBV) https://t.co/92X8f1oqLJ https://buff.ly/2FCOc57lordman1982
2020-09-15 14:40:05So just been testing the @SecuraBV #Zerologon CVE-2020-1472 PoC by @_dirkjan and it's a big yikes for sure! And ve… https://t.co/EtVqyzXpBX https://twitter.com/i/web/status/1305876972178935808bleepsec
2020-09-15 14:30:05New Windows exploit (CVE-2020-1472) lets you instantly become admin Info: Zerologon lets anyone with a network toe… https://t.co/10UKv4vNba https://twitter.com/i/web/status/1305874808664621062CKsTechNews
2020-09-15 14:30:04CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/8cODFadUcZ https://www.tenable.com/blog/cve-2020-1472-zerologon-vulnerability-in-netlogon-could-allow-attackers-to-hijack-windowsJacobDjWilson
2020-09-15 14:20:08Kritiska MS Netlogon ievainojamība CVE-2020-1472 ļauj uzbrucējam atiestatīt aktīvās direktorijas (Active Directory)… https://t.co/HXM68RAZoi https://twitter.com/i/web/status/1305871774350020610certlv
2020-09-15 14:20:06[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/b2n6SY9pLL https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/IINAlab
2020-09-15 14:20:05[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/fvZkfJKf6m https://aeternusmalus.wordpress.com/2020/09/15/blog-zerologon-instantly-become-domain-admin-by-subverting-netlogon-cryptography-cve-2020-1472-2/DoggoJoshu
2020-09-15 14:10:08If you haven't run #Microsoft's August 2020 patches on your servers, DO IT NOW. An important patch, CVE-2020-1472,… https://t.co/slh07wclTz https://twitter.com/i/web/status/1305869054767443969brycea
2020-09-15 14:10:05The 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller. CVE-2020-1472… https://t.co/v999DloNl9 https://twitter.com/i/web/status/1305870226345656320cybersmithIO
2020-09-15 14:10:05POC for Microsoft's "#Zerologon" CVSS 10 bug (CVE-2020-1472), patched in Aug. https://t.co/I5jbj8jH0k Via @securabv… https://t.co/lrGmHMXKu5 https://www.secura.com/blog/zero-logon https://twitter.com/i/web/status/1305870113409728512CBREditor
2020-09-15 14:00:09New post: CVE-2020-1472 угрожает контроллеру домена | Блог Касперского https://t.co/SUTYO1ynVl https://reportcybercrime.com/cve-2020-1472-угрожает-контроллеру-домена-блог-к/digitpol_cyber
2020-09-15 14:00:06Shoutout to Elias for creating an awesome and easy to use PoC for CVE-2020-1472 / Zerologon. This was tested on… https://t.co/srWEHLXGRq https://twitter.com/i/web/status/1305867533233291265s1nfulz
2020-09-15 13:50:04CVE-2020-1472 POC is available! Allows you to change the DC machine account password so you can DCSync. It also inc… https://t.co/2UnK2VVgZK https://twitter.com/i/web/status/1305865563286188034TimMedin
2020-09-15 13:40:06PoC for #Zerologon vulnerability @CVEnew @CVEannounce CVE-2020-1472 which could allow us to carry out an unauthenti… https://t.co/F5myKVINNQ https://twitter.com/i/web/status/1305861969128415233misaelban
2020-09-15 13:40:03CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller… https://t.co/OxAzV36po1 https://twitter.com/i/web/status/1305863884708950019lizbeth_plaza
2020-09-15 13:30:06CVE-2020-1472 Netlogon authentication bypass. https://t.co/jCPMwO061G #infosec #CVE https://t.co/YQ8VACOr5Y https://github.com/SecuraBV/CVE-2020-1472RapidSafeguard
2020-09-15 13:30:05Zerologon : instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) :… https://t.co/F5VV7sCuJ1 https://twitter.com/i/web/status/1305861031995092992binitamshah
2020-09-15 13:30:05@CVEnew @CVEannounce New vulnerability #CVE CVE-2020-1472 #Microsoft #Windows Netlogon authentication bypass.… https://t.co/JHKz7G7ODF https://twitter.com/i/web/status/1305860326798352387misaelban
2020-09-15 13:30:04@GossiTheDog @ItsReallyNick @James_inthe_box @campuscodi Can I get a confirmation that CVE-2020-1472 phase 1 patch… https://t.co/KnzhIP1rxK https://twitter.com/i/web/status/1305861152715440134KorbenD_Intel
2020-09-15 13:20:03CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/1IQpJ7ccJT https://blog.rapid7.com/2020/09/14/cve-2020-1472-zerologon-critical-privilege-escalation/nujakcities
2020-09-15 13:10:05CVE-2020-1472 угрожает контроллеру домена https://t.co/drbIyjOmKg https://t.co/zlGLq34kK5 https://bit.ly/32vg1W3kmscom3
2020-09-15 13:00:07New post: Netlogon 特权提升漏洞通告(CVE-2020-1472) https://t.co/KIKpi0EEgA特权提升漏洞通告(cve-2020-1472)/ https://reportcybercrime.com/netlogon-digitpol_cyber
2020-09-15 13:00:05CVE-2020-1472 - Microsoft did it again. Time to pwn the world! https://t.co/f7SWQsAUP0sw33tcr4b
2020-09-15 13:00:03Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/RCFr5cdR7o https://t.co/MUxIU6gieF https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472SecureNetIT
2020-09-15 13:00:03次の4連休、1日休めれば良いかと思いきや Zerologon (CVE-2020-1472)対応で 連休最終日と次の土日とかで対応しないとまずいかなぁ😱 UTM類は、この間、アップデートしたから脆弱性は無いといえ…itnews_jp
2020-09-15 12:20:11Hacker können über Schwachstelle Windows Domain-Controller kapern CVE-2020-1472: Die Sicherheitsanfälligkeit "Zerol… https://t.co/B09mnuXdcF https://twitter.com/i/web/status/1305839452808523776sec_euro
2020-09-15 12:20:04CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/fgAzQmhKCk http://ow.ly/MYrf102mAB1BullStallcup
2020-09-15 12:20:03@canyoupwnme here the exploit code for CVE-2020-1472Void_Sec
2020-09-15 12:10:07CVE-2020-1472 has highlighted why every company must ensure patching is given the attention it needs. I see to man… https://t.co/6YeKeOtrQt https://twitter.com/i/web/status/1305839773022593024WannabeCISO
2020-09-15 12:10:06やんないといけなさそう😓→[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/nQg3VBn2LE http://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/itnews_jp
2020-09-15 12:10:03CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/3gR8chMqdF http://ow.ly/Zhav102mAApArt_Capella
2020-09-15 12:00:07CVE-2020-1472 is this generations MS08-067 Pentesters be like, AMEN!!!dcuthbert
2020-09-15 11:50:05CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/0KiYPBC48i http://ow.ly/8vXO102mAwZAlicePintori
2020-09-15 11:20:03NetLogon特权提升漏洞(CVE-2020-1472): NetLogon特权提升漏洞(CVE-2020-1472) https://t.co/0koGaSmqLC https://goo.gl/fb/cLUH3sthreatmeter
2020-09-15 11:00:05CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/xInU0N6ID6 https://blog.rapid7.com/2020/09/14/cve-2020-1472-zerologon-critical-privilege-escalation/Bo_Datenschutz
2020-09-15 11:00:05Act & Patch Now. CVE-2020-1472 "Zerologon" Critical Privilege Escalation Vulnerability Compromises Domain Controlle… https://t.co/ZpwZ3CeX8n https://twitter.com/i/web/status/1305822816907014144AshcoSystems
2020-09-15 11:00:04[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/jbRS3nfBXo https://www.secura.com/blog/zero-logonunkn0wnbit
2020-09-15 10:50:07Zerologon (CVE-2020-1472) は、今後ガッツリ使われていくんだろうなぁ。 パッチ当ててないけど外にポイント設けてないから平気、とか言ってると、一般ユーザーがひっかかってC2Cとの中継ファイルを仕掛けられて、攻撃されるんだろうなぁ。96sc_
2020-09-15 10:50:04RODCも影響受けるらしい。 How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/wDnx5F9Mp7 https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoclink_speed
2020-09-15 10:40:04https://t.co/xBrKgdn91s Zerologon (CVE-2020-1472) PoC by #modifying the #original test tool from #secura https://t.co/vEcyv55a2A http://anonymous.bravehost.com/main/2020/09/15/119890/hacking/VitalAnon
2020-09-15 10:30:08🔴 Vulnerabilidad en el Netlogon Remote Protocol (MS-NRPC) de Microsoft (CVE-2020-1472) Vulnerabilidad de elevación… https://t.co/v1o2mWPqX1 https://twitter.com/i/web/status/1305813619565883392juliobalderrama
2020-09-15 10:20:05CVE-2020-1472 - Zerologon PoC https://t.co/7Sob6bf5vm https://raw.githubusercontent.com/blackarrowsec/redteam-research/master/CVE-2020-1472/CVE-2020-1472.pystaatsgeheim
2020-09-15 10:10:09Are your domain controllers safe from Zerologon attacks?: CVE-2020-1472, a privilege elevation vulnerability in the… https://t.co/g3u1oTNHOm https://twitter.com/i/web/status/1305808841360113666shah_sheikh
2020-09-15 10:10:07Are your domain controllers safe from Zerologon attacks?: CVE-2020-1472, a privilege elevation vulnerability in the… https://t.co/iR1pC4oBsj https://twitter.com/i/web/status/1305810483383918593cipherstorm
2020-09-15 09:50:09Secura has published a whitepaper on CVE-2020-1472 or 'Zerologon', a CVSS 10.0 vulnerability in the Netlogon protoc… https://t.co/6oVoWXNtyU https://twitter.com/i/web/status/1305803554645565440virusbtn
2020-09-15 09:50:07#security #Alerta #Alarmin de la CISA "Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472" lindo par… https://t.co/TMWYfO36Bd https://twitter.com/i/web/status/1305804261952028672INFOmailiTV
2020-09-15 09:50:07CVE-2020-1472 exploit has been released. Don't forget to patch every domain controllers in your network. Note that… https://t.co/3hRIfjCowu https://twitter.com/i/web/status/1305804259871645696gmillour_
2020-09-15 09:40:08Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/BXOx7stlZW https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472staatsgeheim
2020-09-15 09:40:08Meet #Zerologon aka CVE-2020-1472, a Windows exploit developed by researchers from security firm #Secura. It allows… https://t.co/aXiphFWLZg https://twitter.com/i/web/status/1305801616239529985iCyberFighter
2020-09-15 09:40:06Run exploit Zerologon (CVE-2020-1472) Thanks @_dirkjan #NCSCVietnam #Zerologon #infosec #cve #security #hacking https://t.co/FncmjLZNePNcscVietnam
2020-09-15 09:30:07#ITSecurity : CVE-2020-1472: Zerologon https://t.co/jP5TdfEv3V https://github.com/blackarrowsec/redteam-research/tree/master/CVE-2020-1472GAILLOTPatrice
2020-09-15 09:30:05Run exploit Zerologon (CVE-2020-1472) Thanks @_dirkjan https://t.co/wL0Aue92Ur https://t.co/cMf8BVZHFz https://github.com/dirkjanm/CVE-2020-1472NcscVietnam
2020-09-15 09:20:04CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability https://t.co/Vvj6HULOgj https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472PVynckier
2020-09-15 09:20:03#ITSecurity : Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/TSlwakzBff https://www.secura.com/blog/zero-logonGAILLOTPatrice
2020-09-15 09:00:06Zerologon (CVE-2020-1472) を ADサーバ側でパケット取りながら自分でも検証。 Whitepaper を見返したり、通信見返したりしてるけど、やっぱり色々驚く(… https://t.co/fFBB9ehZTw https://twitter.com/i/web/status/1305792199066488833mimura1133
2020-09-15 09:00:04We did the #zerologon PoC yesterday thanks to @SecuraBV awesome CVE-2020-1472+paper. Congratz on the beautiful find… https://t.co/03s24tlDmS https://twitter.com/i/web/status/1305792951600197632w_levin
2020-09-15 08:50:07Companies who offer CIFS/SMB on @NetApp filers may want to read this article about the impact of CVE-2020-1472 on O… https://t.co/0rq9qiWpiV https://twitter.com/i/web/status/1305788665273167872RFC2321
2020-09-15 08:40:06Fully working exploit, Zerologon: CVE-2020-1472 https://t.co/vNTYcoFY1U https://github.com/blackarrowsec/redteam-research/tree/master/CVE-2020-1472omarbv
2020-09-15 08:40:05A new #attackerkb assesment on 'CVE-2020-1472 aka Zerologon' has been created by VoidSec. Attacker Value: 5 | Explo… https://t.co/GG7BHz3bJd https://twitter.com/i/web/status/1305787462166478848Attackerkb_Bot
2020-09-15 08:30:09Un exploit est disponible sur la vulnérabilité CVE-2020-1472 (ZeroLogon). Le Cert-IST va émettre une alerte. https://t.co/zvGWrAYeei https://tinyurl.com/y3sbastrcert_ist
2020-09-15 08:30:03Arbeitstag 112 im #homeoffice: CVSS 10 incomming (CVE-2020-1472) update your DCs #patchyourshit https://t.co/0UmUdzYUYlschwedenmut
2020-09-15 08:20:07🔥 ⚠ 🚨 CVE-2020-1472 (aka ZeroLogon) has just been added to Mimikatz... https://t.co/JHEUiTQClN https://twitter.com/gentilkiwi/status/1305659499991183361BushidoToken
2020-09-15 08:20:04instantly become #domainadmin by subverting #Netlogon #cryptography (CVE-2020-1472) https://t.co/0m2ipqvY3Y https://buff.ly/2FCOc57beuchelt
2020-09-15 08:10:07"Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)" via Lobsters 2020-09… https://t.co/tqMjXKt8RU https://twitter.com/i/web/status/1305779489973194753bot_devurls_com
2020-09-15 08:10:06🚨CVE-2020-1472 aka zerologon [https://t.co/Mxr9klTCPm] ⚠️☢️PoC⬇️ https://t.co/z47DTV1CfG https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks https://twitter.com/_dirkjan/status/1305552475890556932Decio_o_o
2020-09-15 08:10:04CVE-2020-1472 (hay ya como 4 PoC activas y funcionales) + #ransomware al azar = Espero que tus #backups sean magníf… https://t.co/N3OzOFbO6Y https://twitter.com/i/web/status/1305780803297779712antoniosanzalc
2020-09-15 08:00:04CVE-2020-1472 POC https://t.co/SLWSNnVirw https://github.com/dirkjanm/CVE-2020-1472/blob/master/restorepassword.pyAcardia2020
2020-09-15 07:50:10CVE-2020-1472 #Zerologon exploitini canlı sisteme denerken dikkat! :) "Do note that by default this changes the pas… https://t.co/GtpstMb0vq https://twitter.com/i/web/status/1305774297764556800ixmailsaygili
2020-09-15 07:50:08@matthieugarin CVSS 7.8/10* pour la CVE-2020-1492, par contre c'est bien 10/10 pour la CVE-2020-1472Nathanael_Mtd
2020-09-15 07:50:07Zerologon攻撃のMS側関連リソース: 「CVE-2020-1472 | Netlogon の特権の昇格の脆弱性」(MSRC , https://t.co/8Xb3j92Q14) 「[AD 管理者向け] CVE-2020-1… https://t.co/sidtHlCcAU https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2020-1472 https://twitter.com/i/web/status/1305775058736963584Tomoi_S
2020-09-15 07:40:05Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472: https://t.co/3HlsX3Vpr0 #follow & #RT #cybersecurity #infosec https://ift.tt/3iw2wv3KeoXes
2020-09-15 07:40:04CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller https://t.co/BxI4lXCEvd http://ow.ly/NW4g102myFmMichal_Jarski
2020-09-15 07:30:06ZeroLogon testing script (CVE-2020-1472) https://t.co/B0Sc1gljx8 https://ift.tt/3kjxmaAbug_less
2020-09-15 07:20:09ZDNet article on Zerologon CVE-2020-1472: https://t.co/BztIyZBmuy #zerologon #CVE20201472 #vulnerability #netlogon #patchnow #cybersecurity https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/SecuraBV
2020-09-15 07:20:09threatmeter: Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 Original release date: September 14,… https://t.co/5RfujulG9D https://twitter.com/i/web/status/1305766491686662144SecurityMagnate
2020-09-15 07:10:11Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 Original release date: September 14, 2020 The Cy… https://t.co/RDzgDWqLP1 https://twitter.com/i/web/status/1305764087192858626threatmeter
2020-09-15 07:10:10Just for clarification: #Zerologon refers to CVE-2020-1472 and means that anyone with connectivity to a Domain Cont… https://t.co/96h10RygMt https://twitter.com/i/web/status/1305764184328671232qd285
2020-09-15 07:10:09ระวังภัย โค้ดโจมตีช่องโหว่ Zerologon (CVE-2020-1472) ถูกเผยแพร่แล้ว อาจถูกแฮกยึดเซิร์ฟเวอร์ได้ ควบรีบแพตช์ https://t.co/KevvIPIzKB https://www.thaicert.or.th/newsbite/2020-09-15-01.html#2020-09-15-01ThaiCERT
2020-09-15 07:10:08Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/xC469MiwxY https://ift.tt/3iw2wv3cyberbuzznews
2020-09-15 07:10:06The exploit code for the critical vulnerability in Netlogon Remote Protocol (CVE-2020-1472) is now publicly availab… https://t.co/51MEqKHmIN https://twitter.com/i/web/status/1305764930403139585CSAsingapore
2020-09-15 07:10:04[Notice-CSA] The exploit code for the critical vulnerability in Netlogon Remote Protocol (CVE-2020-1472) is now pub… https://t.co/Rrp9eyAKOQ https://twitter.com/i/web/status/1305765175593594881SG_Alerts
2020-09-15 06:40:04I love how everyone's making their own POC for Zerologon (CVE-2020-1472) its fun to see people add their little spin on thingsolivier_boschko
2020-09-15 06:40:04[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/Xo9whrm8nt https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/oha000
2020-09-15 06:40:03#Zerologon CVE-2020-1472 with a score of 10, is one of the most dangerous attacks of all times where one can instan… https://t.co/VD3mNRSssM https://twitter.com/i/web/status/1305758186872492040Nawdiral
2020-09-15 06:30:11Zerologon (CVE-2020-1472, CVSS 10) attack lets hackers take over enterprise networks: Patch now Microsoft patches o… https://t.co/N8xVtfwAUM https://twitter.com/i/web/status/1305754353601568769argevise
2020-09-15 06:30:03Zerologon: PoC exploit CVE-2020-1472 ya disponible (CVSS 10.0) https://t.co/ptyJsT813z https://nuevoperiodico.com/el-nuevo-exploit-de-windows-le-permite-convertirse-instantaneamente-en-administrador-has-parcheado/jandres_casado
2020-09-15 06:20:07@gentilkiwi CVE-2020-1472 I presume?RemkoWeijnen
2020-09-15 06:20:05Without sharing the details behind the shocking #vulnerability CVE-2020-1472, #Microsoft patched one of the most se… https://t.co/MOiGKJEYHu https://twitter.com/i/web/status/1305752627762860032The_Proc
2020-09-15 05:50:05Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) Patch available and to… https://t.co/y9hilGyUIW https://twitter.com/i/web/status/1305744763212234752stratechno
2020-09-15 05:40:04Windows updates available for CVE-2020-1472: Netlogon Elevation of Privilege Vulnerability. The vulnerability in al… https://t.co/E4kWp5vr8K https://twitter.com/i/web/status/1305742816480559105circl_lu
2020-09-15 05:30:06[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 - Microsoft Security Response Center https://t.co/1CDhpfat2m https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/madaodasu
2020-09-15 05:10:06Zerologon CVE-2020-1472 POC https://t.co/iz1rJtBczP https://github.com/dirkjanm/CVE-2020-1472Cyber_O51NT
2020-09-15 05:10:05CVE-2020-1472について、イベントログを監視すること、KBに書いているんだけど、そもそもパッチを当てないとでないので、そこんとこ夜露死苦。 いや、とっととあてるべきよ。こういうのは。papa_anniekey
2020-09-15 05:10:03New post: CVE-2020-1472:NetLogon特权提升漏洞通告 https://t.co/U4KrIHH3UQ:netlogon特权提升漏洞通告-2/ https://reportcybercrime.com/cve-2020-1472digitpol_cyber
2020-09-15 05:00:04CVE-2020-1472のパッチ、定例サイクルに組み込まれて緊急でパッチしない組織って結構あるんかな… DCは外からアクセスできないから通常対応って言われたわSushibar4649
2020-09-15 05:00:03[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/Xo9whrDJM3 https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/oha000
2020-09-15 04:50:10---2020 年 9 月 15 日 更新--- CVE-2020-1472 について、攻撃コードが公開されているとの情報が公表されています。 攻撃が行われた場合の影響が大きいため、2020 年 8 月のセキュリティ更新プログラム… https://t.co/WtGPQ5mvgX https://twitter.com/i/web/status/1305728440268591111taku888infinity
2020-09-15 04:50:06Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/hF5WjZZrL2 https://twitter.com/i/web/status/1305729870266347520ptracesecurity
2020-09-15 04:40:03@symantec @Broadcom @NortonLifelock CVE-2020-1472alex37301356
2020-09-15 04:30:06New post: 【安全通报】Microsoft NetLogon远程特权提升漏洞(CVE-2020-1472)通告 https://t.co/gtwdPGBsrt【安全通报】microsoft-netlogon远程特权提升漏洞(cve-2020-1472)通告/ https://reportcybercrime.com/digitpol_cyber
2020-09-15 04:30:04#Zerologon (CVE-2020-1472), the most insane #vulnerability ever! Domain Admin privileges immediately from unauthent… https://t.co/qboaOSXOrW https://twitter.com/i/web/status/1305724968966254592glivada
2020-09-15 04:20:06脆弱性「Zerologon」でドメイン管理者権限奪取のおそれ - 詳細明らかに https://t.co/BCWYDs3lSy 『「CVE-2020-1472」は、ドメイン管理者権限を取得可能となる脆弱性。同脆弱性を発見し、マイ… https://t.co/oy9peAI1cV https://www.security-next.com/118464 https://twitter.com/i/web/status/1305721803499692032taku888infinity
2020-09-15 04:10:08From @wdormann : I can confirm that this public exploit for Zerologon (CVE-2020-1472) works. Anybody who has not i… https://t.co/D5BHDGsYcY https://twitter.com/i/web/status/1305718834712711168argevise
2020-09-15 04:00:10Vulnérabilité Critique Microsoft « Netlogon » CVE-2020-1472 CVSS 10, merci bcp Chafik (Chafik Mohamed ) pour ces é… https://t.co/B2yJ5Ey4dl https://twitter.com/i/web/status/1305715625550123010argevise
2020-09-15 04:00:081ヶ月遅れのCVE-2020-1472fate_fox
2020-09-15 03:40:07ゆりか先生がBlogを書いてくれました。 予想通り、非WindowsデバイスのNetlogon実装みたいですね。 イベントログでエラー確認しメーカーに連絡し対応ですね。 [AD 管理者向け] CVE-2020-1472 Netlo… https://t.co/rrBriwTzFT https://twitter.com/i/web/status/1305711576645685249ripjyr
2020-09-15 03:40:05[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 https://t.co/yFvmutjWJB https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/ka0com
2020-09-15 03:30:09Active Directory 管理者向けに CVE-2020-1472 Netlogon の脆弱性の概要と、必要となる作業の概要をセキュリティ チーム ブログにて公開しています。 https://t.co/1npkV1aTmu https://msrc-blog.microsoft.com/2020/09/14/20200915_netlogon/JSECTEAM
2020-09-15 03:30:07これが厄介『非 Windows OS の場合は、Netlogon 実装が Secure RPC に対応するよう更新する必要があります』:[AD 管理者向け] CVE-2020-1472 Netlogon の対応ガイダンスの概要 -… https://t.co/SWP1aXS4s9 https://twitter.com/i/web/status/1305708951699255298tamosan
2020-09-15 03:30:05Active Directory 管理者向けに、本脆弱性の概要と必要となる作業の概要の解説ブログを出しました。ぜひご参照いただき、早めの対処のご検討をおねがいします → [AD 管理者向け] CVE-2020-1472 Netlo… https://t.co/SvJWUQDQLO https://twitter.com/i/web/status/1305709512603529225EurekaBerry
2020-09-15 03:30:04อย่าลืมทำ Windows Update กันนะครับ ตัว CVE-2020-1472 มีเครื่องมือใช้โจมตีออกมาแล้ว อ้อ...ยังไงก็อย่าลืมเทสก่อนขึ้น… https://t.co/uLM2IomTeW https://twitter.com/i/web/status/1305710237161328641idomez
2020-09-15 03:30:03Zerologon攻撃、未認証でDC管理者権限を取得されるリスク。CVSSスコア10の深刻な脆弱性 https://t.co/zPFsBtLSHN Zerologon(CVE-2020-1472)はこれかー https://news.yahoo.co.jp/byline/ohmototakashi/20200915-00198345/flano_yuki
2020-09-15 03:20:06From @Wormable : I can confirm that this public exploit for Zerologon (CVE-2020-1472) works. Anybody who has not i… https://t.co/by7P72pt44 https://twitter.com/i/web/status/1305707080838533120argevise
2020-09-15 03:20:06Exploit for Critical Vulnerability #CVE-2020-1472 in #Microsoft’s Netlogon is available publicly that lets any unau… https://t.co/OCcZnyJb06 https://twitter.com/i/web/status/1305706447473262593NCIIPC
2020-09-15 03:11:24CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know - https://t.co/LFPocaiRks #Hacking… https://t.co/vAVoJJLcWo https://www.redpacketsecurity.com/cve-2020-1472-zerologon-critical-privilege-escalation-what-you-need-to-know/ https://twitter.com/i/web/status/1305658018177130498RedPacketSec
2020-09-15 03:10:06New Windows exploit lets you instantly become admin. Have you patched? CVE-2020-1472, as the vulnerability is tra… https://t.co/t1Hq8OynqI https://twitter.com/i/web/status/1305703140847689729_therealmark_
2020-09-15 02:50:048/11にはCVSSスコアを設定していたと書いてあるが10だったら1ヶ月後の今になって話題になるわけないだろ… CVE-2020-1472 | Netlogon の特権の昇格の脆弱性 https://t.co/NZ4qzIS36A https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2020-1472Sushibar4649
2020-09-15 02:50:03Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/fVuc6Wpyis #uscert #gov https://buff.ly/3kgTsulNotTruppi
2020-09-15 02:20:05[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/ahI9n8iEwr https://www.secura.com/blog/zero-logonhiropooh
2020-09-15 02:10:07A new vulnerability was disclosed late last week with a critical vulnerability called zerologin (CVE-2020-1472), th… https://t.co/Pn81vXnj1y https://twitter.com/i/web/status/1305688937315184640Bl4ck0p
2020-09-15 02:00:08Zerologon (CVE-2020-1472)、試してみたけどやばすぎて笑った https://t.co/pWHjfvEQ5Dshutingrz
2020-09-15 01:50:068月修正「Windows Server」の脆弱性狙う悪用コードが公開 - 米政府警告:Security NEXT ✔︎CVE-2020-1472の攻撃コードが公開 ✔︎MS-NRPCを使用してドメインコントローラーと脆弱な接続… https://t.co/fONU9c568Z https://twitter.com/i/web/status/1305682947043807238_spxn
2020-09-15 01:50:05Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 | CISA https://t.co/E4Nl0WEr6s https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472_spxn
2020-09-15 01:40:05【セキュリティ ニュース】8月修正「Windows Server」の脆弱性狙う悪用コードが公開 - 米政府警告 https://t.co/SbffjYsWUc 『「CVE-2020-1472」は、「Windows Server」に明らかとなった脆弱性。』 https://www.security-next.com/118455taku888infinity
2020-09-15 01:40:04CVE-2020-1472 のExploitをとりあえず試してこようかな。今日ペンテストある人とか捗りそう?sen_u
2020-09-15 01:40:03New post: [更新1.0|PoC公开]CVE-2020-1472: NetLogon特权提升漏洞通告 – 360CERT https://t.co/gtwdPGBsrt更新1-0poc公开cve-2020-1472-netlogon特权提升漏洞通告-360cert/ https://reportcybercrime.com/digitpol_cyber
2020-09-15 01:20:08Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/FB1f1gmDFz https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472Pyo0072
2020-09-15 01:20:07CVE-2020-1472 is really juicy. I like it because it’s another digital transformation driver.notameadow
2020-09-15 01:20:06Technical details of CVE-2020-1472 Zerologon https://t.co/ZOcfblezGl https://www.secura.com/pathtoimg.php?id=20551nf0s3cpt
2020-09-15 01:00:05確かに書いてある。 期限がゆりか先生のお告げで、2021年2月確定っぽい。 --- CVE-2020-1472 | Netlogon の特権の昇格の脆弱性 → https://t.co/59F17julnO https://t.co/6hdgG8t5H4 https://bit.ly/3hD0Sqkripjyr
2020-09-15 01:00:04Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 - https://t.co/5HrXX8q7t8 https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472ka0com
2020-09-15 01:00:04CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 https://t.co/e0UFewlG8F https://support.microsoft.com/ja-jp/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocnaka_mura_masa
2020-09-15 01:00:03CVE-2020-1472 に関連する Netlogon セキュア チャネル接続の変更を管理する方法 → https://t.co/YHLvt79HuY https://bit.ly/3hxCBScripjyr
2020-09-15 00:50:07» Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 | CISA https://t.co/11iOMJZTG0 https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472yuuyuyu_ka
2020-09-15 00:50:06CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know - https://t.co/NUr4JGi0PA https://blog.rapid7.com/2020/09/14/cve-2020-1472-zerologon-critical-privilege-escalation/ka0com
2020-09-15 00:50:05CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller - https://t.co/oasuTDTp5y https://www.tenable.com/blog/cve-2020-1472-zerologon-vulnerability-in-netlogon-could-allow-attackers-to-hijack-windowska0com
2020-09-15 00:50:04New post: CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/4tkrG0IIU2 https://reportcybercrime.com/cve-2020-1472-zerologon-critical-privilege-escalation-what-you-need-to-know/digitpol_cyber
2020-09-15 00:30:07https://t.co/80tN6Wjtb7 CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Window… https://t.co/gaxpRD7tv4 https://www.tenable.com/blog/cve-2020-1472-zerologon-vulnerability-in-netlogon-could-allow-attackers-to-hijack-windows https://twitter.com/i/web/status/1305662642720313344netsecu
2020-09-15 00:20:03Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/bPg5vomR1j https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472thalles
2020-09-15 00:10:09Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/nJHbs6X5tm https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472microkeyword
2020-09-15 00:00:07CVE-2020-1472 - unauthenticated priv esc to DA, MS patch released in August, exploit code now public. https://t.co/FW8k2ejR6a https://arstechnica.com/information-technology/2020/09/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched/ShannonTony
2020-09-15 00:00:06GitHub - dirkjanm/CVE-2020-1472: PoC for Zerologon - all research credits go to Tom Tervoort of Secura - https://t.co/73SFzgLLE3 https://github.com/dirkjanm/CVE-2020-1472piedpiper1616
2020-09-15 00:00:06Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 - https://t.co/gr8TyiwwEE https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472moton
2020-09-14 23:40:09Rapid7 Blog | CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know https://t.co/zXIdmJU0nG https://bit.ly/3hxeAuuStopMalvertisin
2020-09-14 23:40:06#Zerologon #Vulnerability: #Exploitation of CVE-2020-1472 allows attackers to impersonate computers, disable securi… https://t.co/NUmDFjoBS1 https://twitter.com/i/web/status/1305650913084932096deepwatch_sec
2020-09-14 23:20:05🤔Utilisateur non authentifié <i>curieux</i> 🢂 😎Domain Admin. Bim. Just like that. "Zerologon" CVE-2020-1472 (patché… https://t.co/d2z4sTIuBA https://twitter.com/i/web/status/1305646517949169664serma_nes_watch
2020-09-14 23:20:03There are multiple confirmed working exploits for CVE-2020-1472 on Github, which drop domain admin access with simp… https://t.co/8gGNIiH5uR https://twitter.com/i/web/status/1305646985337352192GossiTheDog
2020-09-14 23:00:11Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/HUVXFxUeRO http://dlvr.it/RgcFJfamolsarwate
2020-09-14 22:50:19Important! Public exploits for CVE-2020-1472 make it a real threat to all unpatched domain controllers. Any attacke… https://t.co/7gHaB8JJS1 https://twitter.com/i/web/status/1305638204830355457fabio_viggiani
2020-09-14 22:40:08Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/ilekjXi4EU #infosec https://www.secura.com/blog/zero-logonallaboutclait
2020-09-14 22:40:05The Zerologon (CVE-2020-1472) is a crazy vulnerability!! Worm is coming!! https://t.co/VW7x4ySs9g #Zerologon #appsec #CyberSecurity #infosec https://www.secura.com/blog/zero-logonsimonroses
2020-09-14 22:10:06Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/SkJVAyPXSQ https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472Sec_Cyber
2020-09-14 22:10:05CVE-2020-1472: PoC for Zerologon - all research credits go to Tom Tervoort of Secura https://t.co/xyQvid1dEL #Python https://github.com/dirkjanm/CVE-2020-1472JekiCode
2020-09-14 22:00:12#infosec Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/dwE9OFSCe5 https://ift.tt/3iw2wv3jeffreydbrown
2020-09-14 22:00:11I have updated this article to add that a PoC for the Zerologon (CVE-2020-1472) vulnerability is now available onli… https://t.co/Qp4QXnbt3l https://twitter.com/i/web/status/1305625403361497088campuscodi
2020-09-14 22:00:09Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/w62FdXMnTa CVE-2020-1472 | Netlogo… https://t.co/UYslkMd3aH https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472 https://twitter.com/i/web/status/1305625907101536256nekochanSec555
2020-09-14 22:00:08[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/MW8vBPts0G https://twitter.com/i/web/status/1305626260308074496nekochanSec555
2020-09-14 21:50:04Zerologon, or CVE-2020-1472, is a critical CVSS10 vulnerability that allows malicious actors to impersonate the ide… https://t.co/6n7aRDELpd https://twitter.com/i/web/status/1305624202758615040AutomoxApp
2020-09-14 21:40:07Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 | CISA https://t.co/pmrooTAZRk https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472_T_MKI
2020-09-14 21:30:18Si tu organización trabaja con #Netlogon, ¡actualiza ahora! 📡 Nombre: #Zerologon 📡 ID: CVE-2020-1472 📡 CVSSv3: 10.… https://t.co/5gNUVkFJsH https://twitter.com/i/web/status/1305617369780441088Cronup_CyberSec
2020-09-14 21:30:17CISA is aware of publicly available exploit code for CVE-2020-1472, an elevation of privilege vulnerability in Micr… https://t.co/zmW6ZaBikF https://twitter.com/i/web/status/1305617882085113857RRalstonAgile
2020-09-14 21:30:14🚨 CVE-2020-1472 | CVSSv3: 10.0 🚨 ¡Llego la hora de actualizar si tu organización trabaja con #NetLogon! https://t.co/glj3Ilel7k https://twitter.com/Cronup_CyberSec/status/1305617369780441088LixaH_CL
2020-09-14 21:30:11Zerologon, or CVE-2020-1472, is a critical CVSS10 #vulnerability that allows malicious actors to impersonate the id… https://t.co/uSvNCTnaS2 https://twitter.com/i/web/status/1305618596727525377AutomoxApp
2020-09-14 21:30:11Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 CISA is aware of publicly available exploit code… https://t.co/vkB90C0VcG https://twitter.com/i/web/status/1305618593065783296z3roTrust
2020-09-14 21:20:13Remember to patch CVE-2020-1472—an elevation of privilege vulnerability in Microsoft’s Netlogon. Read more at… https://t.co/ucq1Y9pDNV https://twitter.com/i/web/status/1305615321244598275USCERT_gov
2020-09-14 21:20:12#zerologon CVE-2020-1472, time to patch your DC ;)t0nynja
2020-09-14 21:20:06CVE-2020-1472, aka Zerologon, is nasty. @RiskSense security analyst @jennamagius developed one of the first publicl… https://t.co/p0Bqip3CS9 https://twitter.com/i/web/status/1305616063896322048RiskSense
2020-09-14 21:10:08Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472: Original release date: September 14, 2020 The… https://t.co/Xv2WUaCyu6 https://goo.gl/fb/szB1s9threatmeter
2020-09-14 21:10:03#Snort rule to detect potential exploitation attempts of #CVE-2020-1472 https://t.co/jo5gfUTaf5 #zerologon #infosecurity https://raw.githubusercontent.com/bhdresh/SnortRules/master/Exploit/CVE-2020-1472.rulesbhdresh
2020-09-14 21:10:03Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/fRbsrtUeNm https://www.itsecuritynews.info/exploit-for-netlogon-remote-protocol-vulnerability-cve-2020-1472/IT_securitynews
2020-09-14 21:00:06Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/De3y8koIf3 #uscert #security https://bit.ly/2FsjAUoATTOGTech
2020-09-14 20:50:17New post: Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/Lw675O7xUj https://reportcybercrime.com/exploit-for-netlogon-remote-protocol-vulnerability-cve-2020-1472/digitpol_cyber
2020-09-14 20:40:10Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/NMa78SO5Dt #cert #security https://bit.ly/2FsjAUoSiciliamConsult
2020-09-14 20:40:09Oh my, CVE-2020-1472 is a real hoot. :/ https://t.co/M57bjPdow0 https://twitter.com/halvarflake/status/1305523566914527237Kensan42
2020-09-14 20:40:07Publicly available exploit code for CVE-2020-1472: elevation of privilege vulnerability in Microsoft Netlogon. Alth… https://t.co/4oLigR1SYl https://twitter.com/i/web/status/1305606051551612929holisticinfosec
2020-09-14 20:40:06Actualicen sus DC's Una de las vulnerabilidades más críticas que he visto en mucho tiempo. CVE-2020-1472 https://t.co/yyQwI0ax7tJulioUrena
2020-09-14 20:30:13Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/xcTp22ADtQ https://sl.advdat.com/32tAFWyADVDAT_OH
2020-09-14 20:30:09Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472https://us-cert.cisa.gov/ncas/current-activity/202… https://t.co/V9bwC2ScnB https://twitter.com/i/web/status/1305603374604341249gregoryfarley
2020-09-14 20:30:09[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/EQdJpDZ0mQ https://www.secura.com/blog/zero-logonatlas7io
2020-09-14 20:20:11Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/ywQYmRtuCW via @USCERT_gov http://dlvr.it/RgbsVzAcooEdi
2020-09-14 20:20:11@damianzaremba Pretty sure that's the sound of CVE-2020-1472 😂IISResetMe
2020-09-14 20:20:05CERT Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/MIeIvnVKGF https://bit.ly/3bX5AOhPAUL_CSFI
2020-09-14 20:20:04Exploit for Netlogon Remote Protocol Vulnerability, CVE-2020-1472 https://t.co/v8Fc5v6KZD https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/exploit-netlogon-remote-protocol-vulnerability-cve-2020-1472?utm_source=dlvr.it&utm_medium=twitterRigneySec
2020-09-14 20:00:09RiskSense will be releasing a weaponized exploit for CVE-2020-1472, aka Zerologon, later today. Stay tuned. #zerologonRiskSense
2020-09-14 19:50:07Zerologon (CVE-2020-1472): 100% reliable Domain Admin privileges immediately from unauthenticated network access to… https://t.co/JONb8DHam0 https://twitter.com/i/web/status/1305593809707958275an0n_r0
2020-09-14 19:50:06Teaching today and just saw @campuscodi post on #ZeroLogin CVE-2020-1472. Shout out to all the system admins that… https://t.co/GukH7ZHQZY https://twitter.com/i/web/status/1305594114784874496jorgeorchilles
2020-09-14 19:40:07Got all caught up in the hype of CVE-2020-1472 (Zerologon), wrote my own PoC to integrate with secretsdump and psex… https://t.co/O9aD5w8WyH https://twitter.com/i/web/status/13055904440599592990xbb00
2020-09-14 19:40:04CVE-2020-1472 is no joke. I just tested the exploit code, ran secretsdump to dcsync and had my test domain hashes in like 2 minutes.frcolumba
2020-09-14 19:30:07Zerologon (CVE-2020-1472) POC: "Do note that by default this changes the password of the domain controller account… https://t.co/eGIG2sN7YY https://twitter.com/i/web/status/1305588484116279301vulmoncom
2020-09-14 19:20:11Can anyone confirm a PoC for CVE-2020-1472 @strandjs @security_score @msftsecurityabunooorrr
2020-09-14 19:20:10Why, hello there CVE-2020-1472notsoevilweasel
2020-09-14 19:20:09CVE-2020-1472. Vienen curvas, si no, tiempo al tiempo.luixtao
2020-09-14 19:20:02If you're out here exploiting Zerologon (CVE-2020-1472) on a DC, do yourself and your clients a favor and change th… https://t.co/kAJtGh566W https://twitter.com/i/web/status/1305586894424518656The_Naterz
2020-09-14 19:00:13What's CVE-2020-1472? It's An elevation of privilege vulnerability exists when an attacker establishes a vulnerable… https://t.co/Gs5iidQ1aT https://twitter.com/i/web/status/1305580481090670592Ke_Cyber
2020-09-14 19:00:12by running this Python script it will test vulnerability for the Zerologon exploit (CVE-2020-1472). ./zerologon_te… https://t.co/1cxInMb5fH https://twitter.com/i/web/status/1305580485116977152Ke_Cyber
2020-09-14 19:00:10This is bad.. CVE-2020-1472 https://t.co/bbTgAR1VfB https://www.secura.com/pathtoimg.php?id=2055infosec_4life
2020-09-14 18:40:07[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/aCWQQ6ZrB2 https://www.secura.com/blog/zero-logonjohannsmith
2020-09-14 18:40:06https://t.co/85p3ysfDxX Another PoC for CVE-2020-1472. I modified @SecuraBV 's scanner, Stage 2 with the password r… https://t.co/4wI8D6Ia9M https://github.com/b4cktr4ck2/CVE-2020-1472/blob/master/exp.py https://twitter.com/i/web/status/1305575954706845696b4cktr4ck2
2020-09-14 18:40:04The race for Zerologon (CVE-2020-1472) has begun, I can confirm public exploits are working😬 Details from Microsoft… https://t.co/DJRuYpbUQT https://twitter.com/i/web/status/1305576642782343170pentest_swissky
2020-09-14 18:30:11CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-14 18:00:08Parece que este CVE-2020-1472 promete ser interesante. Convertirse en Domain Admin atacando al Netlogon. ¡Hay que… https://t.co/0FBr43tbuc https://twitter.com/i/web/status/1305564978603266051manelrodero
2020-09-14 18:00:03CVE-2020-1472 kodu ile yayınlanan ve Domain Controller’lar üzerinde yetkisiz kod çalıştırmaya imkan tanıyan kritik… https://t.co/nVIshWDcJ3 https://twitter.com/i/web/status/1305566561873387526emrahkocabuga
2020-09-14 17:50:09CVE-2020-1472: PoC for Zerologon https://t.co/ubjlAGcIQD https://github.com/dirkjanm/CVE-2020-1472jedisct1
2020-09-14 17:50:0710 saniyede DC'yi ele geçirebilen yeni zafiyet CVE-2020-1472 https://t.co/rdQUFNWUMH https://www.secura.com/blog/zero-logonberk_imran
2020-09-14 17:50:05Yeah, I can confirm that this public exploit for Zerologon (CVE-2020-1472) works. Anybody who has not installed th… https://t.co/R7AQ75MZDV https://twitter.com/i/web/status/1305564045282598912wdormann
2020-09-14 17:30:13ma boi @cube0x0 made a POC for CVE-2020-1472 (Zerologon) GJ dude! https://t.co/VhY2wK3gIK https://twitter.com/cube0x0/status/1305552726663856134WhortonMr
2020-09-14 17:20:12Really CVE-2020-1472?! This is kicking my ass 😭HersdayAtoms
2020-09-14 17:20:060-Domain Admin in 10 seconds with Zerologon (CVE-2020-1472) Using @_dirkjan 's NetrServerPasswordSet2 commit to im… https://t.co/JXmPKNDvuK https://twitter.com/i/web/status/1305556202974334983buffaloverflow
2020-09-14 17:20:05[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/fHRj7U4mfq https://www.secura.com/blog/zero-logonm2htd
2020-09-14 17:10:10exploit POC for CVE-2020-1472 (Zerologon: instantly become domain admin by subverting Netlogon cryptography) https://t.co/xBHt2x56Ws https://github.com/cube0x0/CVE-2020-1472cube0x0
2020-09-14 17:00:07Zerologon: Unauthenticated domain controller compromise by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/lGc71vHeCQ https://ift.tt/2H06TAFeyalestrin
2020-09-14 16:40:09CVE-2020-1472: Zerologon https://t.co/SAm7ZG5IV1 https://github.com/blackarrowsec/redteam-research/tree/master/CVE-2020-1472nilssonanders
2020-09-14 16:40:08Zerologon attack allows threat actors to take over enterprise networks by exploiting the CVE-2020-1472 patched in t… https://t.co/1f14I9tqS7 https://twitter.com/i/web/status/1305545159329816584iamTdivyesh
2020-09-14 16:30:03So for CVE-2020-1472. (Netlogon Vulnerability) Is there any other remediations that can take place to protect Dom… https://t.co/4rfDQGSzum https://twitter.com/i/web/status/1305544177640443913blueteamblog
2020-09-14 16:30:02This weekend we've been working in a #Zerologon exploit (CVE-2020-1472), check it out! #redteam https://t.co/I9GpZXZEir https://twitter.com/BlackArrowSec/status/1305524479397900289xassiz
2020-09-14 16:20:08[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/tPsJa7GwGn https://www.secura.com/blog/zero-logonEVarjus
2020-09-14 16:20:04Unauth #RCE for Domain Controllers #Zerologon (CVE-2020-1472): Unauthenticated user to Domain Admin. DCSync with DC… https://t.co/RuBLZgGpmq https://twitter.com/i/web/status/1305541315145465857sky31337
2020-09-14 16:10:09CVE-2020-1472 reproduced #zerologon vulnerability! It's an unauth RCE for Domain Controllers. What next https://t.co/ogv0SnL1yr https://dirteam.com/sander/2020/08/11/knowledgebase-you-experience-warnings-with-eventid-5829-on-domain-controllers/OKoreev
2020-09-14 16:00:07[WARNING| #zerologon (CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE exploit the wil… https://t.co/C2XSI4J9t4 https://twitter.com/i/web/status/1305535416255291392ToolsWatch
2020-09-14 16:00:07[WARNING| #zerologon (CVE-2020-1472) Unauthenticated domain controller compromise vulnerability RCE exploit the wil… https://t.co/6HKXmHlbJO https://twitter.com/i/web/status/1305535281655885825vFeed_IO
2020-09-14 15:50:04[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/9hj64DXyPD https://www.secura.com/blog/zero-logonMasafumiNegishi
2020-09-14 15:30:11ZeroLogon testing script (CVE-2020-1472) https://t.co/ahJ1ati11i #ZeroLogon #infosec #cve #security #hacking #anonymous https://cyberwarzone.com/zerologon-testing-script-cve-2020-1472/Cyberwarzonecom
2020-09-14 15:20:11PoC for #Zerologon vulnerability (CVE-2020-1472) which could allow us to carry out an unauthenticated Domain Contro… https://t.co/UzRvRF8qoM https://twitter.com/i/web/status/1305524479397900289BlackArrowSec
2020-09-14 15:20:10Technical details of CVE-2020-1472 Zerologon https://t.co/Jy9V6NGY1K #appsec #security #secops https://ift.tt/3ixrWbBrtcz_io
2020-09-14 15:20:06🔥#CVE-2020-1472 Netlogon Elevation of Privilege Vulnerability (All in One) ➡️[BLOG]:https://t.co/1mtrFlopdK ➡️[PoC… https://t.co/3MJYkOU7gq http://secura.com/blog/zero-logon https://twitter.com/i/web/status/1305526050051502082rimpq
2020-09-14 15:20:04ZeroLogon testing script (CVE-2020-1472) https://t.co/ahJ1ati11i #infosec #security #hacking #secura #zerologon #test #ciso #argg https://cyberwarzone.com/zerologon-testing-script-cve-2020-1472/Cyberwarzonecom
2020-09-14 15:10:03PoC for #Zerologon vulnerability (CVE-2020-1472) which could allow us to carry out an unauthenticated Domain Contro… https://t.co/2m790jfaEm https://twitter.com/i/web/status/1305524062135955456BlackArrowSec
2020-09-14 15:00:12Domain-Controller-Übernahme aus dem internen Netz: Mehr Details zu CVE-2020-1472 https://t.co/DoHHVD3XmZ https://cert.at/de/aktuelles/2020/9/domain-controller-ubernahme-aus-dem-internen-netz-mehr-details-zu-cve-2020-1472CERT_at
2020-09-14 15:00:05ミテマスヨー: [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/UbVf1YzBYl https://www.secura.com/blog/zero-logonmadaodasu
2020-09-14 14:50:21[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/85XgVSb541 https://twitter.com/i/web/status/1305516670459363328autumn_good_35
2020-09-14 14:50:19[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/fZWXLVNtMq https://www.secura.com/blog/zero-logonohhara_shiojiri
2020-09-14 14:50:17Top story: [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/y51Ef6Osri https://twitter.com/i/web/status/1305517532909056005securitycrusade
2020-09-14 14:40:10https://t.co/LUB62n4vUw Hackers can take control of corporate networks using Zerologon vulnerability CVE-2020-1472… https://t.co/xYc2foIFOj https://www.secura.com/blog/zero-logon https://twitter.com/i/web/status/1305515055790858245Zanket_com
2020-09-14 14:30:08Trending News: [Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/CuIpvTrfsd https://twitter.com/i/web/status/1305512484804190209susession
2020-09-14 14:30:07[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/0KrjbJtuHY https://nzzl.us/WgKBmSEkhaos_farbauti
2020-09-14 14:20:12ナニコレヒドイ / “Dirk-jan on Twitter: "So yes, Zerologon (CVE-2020-1472) is quite easy to exploit. Unauthenticated user t… https://t.co/PjUqK5aKCO https://twitter.com/i/web/status/1305509239524265985waiha8
2020-09-14 14:10:13Test tool for #CVE-2020-1472 (DC auth bypass) https://t.co/HAiaRJHBLh https://github.com/SecuraBV/CVE-2020-1472WilfridBlanc
2020-09-14 14:10:10CVE-2020-1472 | Netlogon の特権の昇格の脆弱性 https://t.co/ICnfELAJzo https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2020-1472push_back
2020-09-14 14:10:09Zerologon: instantly become domain admin by subverting #Microsoft Netlogon cryptography (CVE-2020-1472)… https://t.co/l0GkAVPV6Z https://twitter.com/i/web/status/1305507604488171523sgoudswaard
2020-09-14 14:00:15Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/WPtU325FjT http://hrbt.us/212262hardreboot
2020-09-14 14:00:14CVE-2020-1472 の Zerologon と来たら Mimikatz に取り込まれても不思議ではないですがさてどうなりますかね0x009AD6_810
2020-09-14 14:00:14Technical details of CVE-2020-1472 Zerologon https://t.co/ysWUlDuKjU http://hrbt.us/212264hardreboot
2020-09-14 14:00:12New post: "Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)" https://t.co/2eaTDtVaJ4 https://ift.tt/2FzG85gMyinfosecfeed
2020-09-14 14:00:09I will wait NetrServerPasswordSet2 to be implemented in impacket. :-) CVE-2020-1472w3bd3vil
2020-09-14 14:00:04Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/X9U6UX5DSN https://www.secura.com/blog/zero-logon_r_netsec
2020-09-14 13:40:04CVE-2020-1472 #zerologon https://t.co/NJgTNXKgLjscriptjunkie1
2020-09-14 13:30:05とにかく、8月の定例パッチで提供されたこの CVE-2020-1472 への修正 https://t.co/mSSQqtzeOu は適用しておかないとヤバいと思います😨 https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2020-14720x009AD6_810
2020-09-14 13:00:11New post: "Technical details of CVE-2020-1472 Zerologon" https://t.co/M2QkRG6nZN https://ift.tt/32qX8UcMyinfosecfeed
2020-09-14 13:00:04Technical details of CVE-2020-1472 Zerologon https://t.co/OB874KlsnH https://www.secura.com/pathtoimg.php?id=2055_r_netsec
2020-09-14 12:40:15[ALERT] The Zerologon (CVE-2020-1472) whitepaper is released https://t.co/R4G60C9Ehw please take this seriously and patch your AD! https://www.secura.com/blog/zero-logondouglasmun
2020-09-14 12:40:12[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/LPiJI1mFRN https://twitter.com/i/web/status/1305484812749352960ReneRobichaud
2020-09-14 12:30:03Some more technical details of CVE-2020-1472 have been released. Press coverage: https://t.co/2hzkH8kQVR Nerd dee… https://t.co/VkzPXUdhO2 https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/ https://twitter.com/i/web/status/1305483822025322497GossiTheDog
2020-09-14 12:20:09We have reproduced the CVE-2020-1472 #zerologon vulnerability! It's an unauth RCE for Domain Controllers. https://t.co/qFe45O7WPRptswarm
2020-09-14 12:20:05Braced for arguments over whether CVE-2020-1472 was intended as a bugdoor. Even if not deliberately designed it see… https://t.co/rqTSprz5K5 https://twitter.com/i/web/status/1305481008872148996HostileSpectrum
2020-09-14 12:10:10So yes, Zerologon (CVE-2020-1472) is quite easy to exploit. Unauthenticated user to Domain Admin. This is really sc… https://t.co/UuVCr9C3Gh https://twitter.com/i/web/status/1305476492386861059_dirkjan
2020-09-14 12:00:03[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/Dp5DnphCch https://www.secura.com/blog/zero-logon?s=09AigarK
2020-09-14 11:50:04CVE-2020-1472 Get to patching this if you have not already done so! #netlogon #CVSS10 https://t.co/hHDvz9vfa4 https://twitter.com/SecuraBV/status/1305450107391938561d4rkshell
2020-09-14 11:50:03Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) "The vulnerability st… https://t.co/ETf9pf3qO0 https://twitter.com/i/web/status/1305472465200713728nilssonanders
2020-09-14 11:20:04A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit (CVE-2020-1472). Gi… https://t.co/VfrtkAwvn1 https://twitter.com/i/web/status/1305465486373724162infosecwar
2020-09-14 10:40:05NEW: paper describing details of CVE-2020-1472 aka #Zerologon (CVSSv3: 10), unauth. Windows DC pwning by subverting… https://t.co/uEBvd1KKv5 https://twitter.com/i/web/status/1305454521687191552mrkoot
2020-09-14 10:30:03Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/3pgcR537eU https://www.secura.com/blog/zero-logonCyber_O51NT
2020-09-14 10:20:04For the record, Zerologon (aka CVE-2020-1472) has been patched in the August 2020 Patch Tuesday It's described as… https://t.co/PjeCdhZfkJ https://twitter.com/i/web/status/1305449375506800640campuscodi
2020-09-14 10:10:04Secura's CVE-2020-1472 whitepaper now available at https://t.co/cfUEzZdJfV (scroll down to download) https://www.secura.com/blog/zero-logondjrevmoon
2020-09-14 10:10:02Secura has published the whitepaper for the Zerologon vulnerability (CVE-2020-1472): https://t.co/RS0nlaXhQD https://www.secura.com/blog/zero-logon_mohemiv
2020-09-14 10:00:03Excited for the release of the whitepaper for the Zerologon, CVE-2020-1472 today. Interesting read at… https://t.co/z4NvaQrCg8 https://twitter.com/i/web/status/13054442799601172500xSV1
2020-09-14 09:40:03Test script for ZeroLogon (CVE-2020-1472) https://t.co/pVYtKwSh5X https://github.com/SecuraBV/CVE-2020-1472TelindusCSIRT
2020-09-14 09:30:03CVE-2020-1472 : A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit It… https://t.co/IrxOl7LpKs https://twitter.com/i/web/status/1305436932902707201Anastasis_King
2020-09-14 09:20:03GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/JZENDmdweq https://github.com/SecuraBV/CVE-2020-1472n0ipr0cs
2020-09-14 09:00:04This is huge https://t.co/mqXUjYrUyJ, (CVE-2020-1472) https://www.secura.com/blog/zero-logonmezdanak
2020-09-14 07:30:06TheHackersNews: Here's a script to test the Netlogon elevation of privilege issue (CVE-2020-1472), a vulnerability… https://t.co/DOEInxhgk7 https://twitter.com/i/web/status/1305405979190845441B01Group
2020-09-14 07:20:04Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) -> https://t.co/EN6xBG5Lfj https://www.secura.com/blog/zero-logonFuzzySec
2020-09-14 07:10:03@TheHackersNews : Here's a script to test the Netlogon elevation of privilege issue (CVE-2020-1472), a vulnerabilit… https://t.co/2cBkQfHXig https://twitter.com/i/web/status/1305401722383273984byHoRRoR
2020-09-14 06:00:02Check if your Domain Controller is vulnerable to CVE-2020-1472 (CVSS:10): how an attacker essentially can become Do… https://t.co/RdtGukEK0Q https://twitter.com/i/web/status/1305385112205434880_odisseus
2020-09-14 05:20:03[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/6DfLFzo7o8 https://www.secura.com/blog/zero-logonnuria_imeq
2020-09-14 00:20:03Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/I2NlOwsNn2 https://t.co/u81ikC9unx http://newsbythehour.org/cybr http://bit.ly/33n5f3zeverythingcybr
2020-09-13 23:00:03Test tool for CVE-2020-1472 https://t.co/Sm6EwSn990 https://github.com/SecuraBV/CVE-2020-1472shodanpunk
2020-09-13 19:00:03https://t.co/3VrJ0fw3dn Test tool for #CVE-2020-1472 (DC auth bypass) http://anonymous.bravehost.com/main/2020/09/13/119682/security/VitalAnon
2020-09-13 18:50:07GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 - https://t.co/ss0fbQQ9p3 https://github.com/SecuraBV/CVE-2020-1472SoLatiK
2020-09-13 18:30:08CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-13 18:10:05Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/diSKYhmGHF https://github.com/SecuraBV/CVE-2020-1472AlexaChenowith
2020-09-13 17:20:03New post in https://t.co/1F9xRsdlML: CVE-2020-1472 https://t.co/k6hEx6G8Eg https://t.co/SBddaqFFWL http://canyoupwn.me https://bit.ly/2DX2zRB https://bit.ly/3bRgs08cypmsecnews
2020-09-13 16:40:04Here's a script to test the Netlogon elevation of privilege issue (CVE-2020-1472), a vulnerability that can be expl… https://t.co/mKbrg4d4X0 https://twitter.com/i/web/status/1305184078958739456TheHackersNews
2020-09-13 14:20:03Zerologon: instantly become domain admin by subverting Netlogon (CVE-2020-1472) https://t.co/ZlCzqd8ugR PoC https://t.co/6TRBdggRSS https://www.secura.com/blog/zero-logon https://github.com/SecuraBV/CVE-2020-1472cyber_advising
2020-09-13 13:20:04Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/7lDi6zP4Do #appsec #security #secops https://ift.tt/3hsvoTqrtcz_io
2020-09-13 12:10:04Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)… https://t.co/fA82H9tHvM https://twitter.com/i/web/status/13051144199161364510xdea
2020-09-13 12:10:04A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit (CVE-2020-1472) Netl… https://t.co/I87sUzGsvW https://twitter.com/i/web/status/1305114247895056384prncpl1nf0s3c
2020-09-13 12:00:03New post: "Test tool for CVE-2020-1472 (DC auth bypass)" https://t.co/kMnpI1NAeo https://ift.tt/33rOggiMyinfosecfeed
2020-09-13 11:20:03Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/wNlGNXcXFY http://hrbt.us/212194hardreboot
2020-09-13 11:20:02Test tool for CVE-2020-1472 (DC auth bypass) https://t.co/bQCCCbNb9T https://github.com/SecuraBV/CVE-2020-1472_r_netsec
2020-09-13 10:30:03[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/vkBjMvATjL https://aeternusmalus.wordpress.com/2020/09/13/blog-zerologon-instantly-become-domain-admin-by-subverting-netlogon-cryptography-cve-2020-1472/DoggoJoshu
2020-09-13 09:10:03CVE-2020-1472 - Test tool for CVE-2020-1472 https://t.co/I0w5HfJZTp http://github.com/SecuraBV/CVE-2020-1472pythontrending
2020-09-13 08:40:03“[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472)” https://t.co/8X4IpGJhg5 https://htn.to/3waaM6npFuwaiha8
2020-09-13 07:30:02Tweeting "CVE-2020-1472" just so I can be involved.ii4xD
2020-09-13 03:50:03[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/0B035B8Bh1 https://www.secura.com/blog/zero-logontais9
2020-09-12 20:50:03Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472): https://t.co/2frCt3XFyO https://www.secura.com/blog/zero-logontombolinux
2020-09-12 20:40:02Added EVTX to repo for CVE-2020-1472 (ZeroLogon)❤️ https://t.co/q739kNlFA0 https://twitter.com/sbousseaden/status/1304867515844243458jessefmoore
2020-09-12 18:30:06CVE-2020-1472 https://t.co/BmC2HucfdQ #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-09-12 16:30:03Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/tZ1Z8K0uC2 https://www.secura.com/blog/zero-logonInf0Junki3
2020-09-12 10:40:03POC for CVE-2020-1472 (CVSS:10) https://t.co/hjzUnYkHhc https://github.com/SecuraBV/CVE-2020-1472SaudiDFIR
2020-09-12 10:40:03(CVE-2020-1472) This is an interesting vulnerability!SaudiDFIR
2020-09-12 08:10:02[Blog] Zerologon: instantly become domain admin by subverting Netlogon cryptography (CVE-2020-1472) https://t.co/uvotTYTJym https://www.secura.com/blog/zero-logonraymondpoede
2020-09-12 07:10:03#sigma rule for CVE-2020-1472 Netlogon MS-NRPC is out, free community access https://t.co/Dpykx7KWBU Detection work… https://t.co/kUvoNFSfZ6 https://tdm.socprime.com/tdm/info/FgNYLnTxIVrs/7GbXfnQBSh4W_EKGaxJx/?p=1 https://twitter.com/i/web/status/1304676530350628864andriinb
2020-09-12 02:30:03Top story's from my Newspaper GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/RLs8tHzBiy,… https://t.co/qrHXMF1J3X https://github.com/SecuraBV/CVE-2020-1472 https://twitter.com/i/web/status/1304607819484848129infowaropcenter
2020-09-12 02:30:03Top story: GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/RLs8tHzBiy, see more https://t.co/op6V5mLutF https://github.com/SecuraBV/CVE-2020-1472 http://tweetedtimes.com/v/16476?s=tnpinfowaropcenter
2020-09-12 00:50:03先月話題になった、WindowsのNetlogonのドメインコントローラ権限昇格の脆弱性(CVE-2020-1472)の検査用スクリプト。試せる環境は用意できてないですが、スクリプトの内容を見る限りFake PoCではなさそうです… https://t.co/BykRc0jRPl https://twitter.com/i/web/status/1304582409355108352gr4vit0n
2020-09-12 00:50:02CyberSec News: GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/cqfDMFqPdQ, see more https://t.co/FQz6lRc2Mo https://github.com/SecuraBV/CVE-2020-1472 http://tweetedtimes.com/v/21183?s=tnpScott_London
2020-09-12 00:40:03CVE-2020-1472測試工具 https://t.co/nTMunIe1jG https://www.secura.com/blog/zero-logonAcardia2020
2020-09-11 23:30:03GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 https://t.co/as3KSKvNYe cc: @EurekaBerry https://github.com/SecuraBV/CVE-2020-14720x009AD6_810
2020-09-11 14:50:04GitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472 - https://t.co/CgjN3TOQKl https://github.com/SecuraBV/CVE-2020-1472piedpiper1616
2020-09-11 13:50:13A reminder to all organisations that they should ensure they patched CVE-2020-1472 (a Netlogon vulnerability from A… https://t.co/Blyo52khtU https://twitter.com/i/web/status/1304415569228300291GossiTheDog
2020-09-11 13:20:04CVE-2020-1472 (CVSSv3=10) aka #Zerologon was fixed in Patch Tuesday Aug 2020: unauth-to-DA privesc via Netlogon in… https://t.co/3oifN6fk8z https://twitter.com/i/web/status/1304408361887301634mrkoot
2020-09-11 13:00:03❗We have just released a test tool for CVE-2020-1472 (CVSS:10) https://t.co/ziQOhJmC0Y The technical whitepaper ab… https://t.co/s9n2QFuWPa https://www.secura.com/blog/zero-logon https://twitter.com/i/web/status/1304404122674892800SecuraBV
2020-09-11 12:30:02We just published a test tool for CVE-2020-1472 (CVSS:10) https://t.co/v18EnF7Xob and next Monday we will publish a… https://t.co/vxUw3UO8FI https://github.com/SecuraBV/CVE-2020-1472/ https://twitter.com/i/web/status/1304396680654204930djrevmoon
2020-09-05 14:10:03なんか知らんけど、Secure Channelを暗号化しなくなったが、2021年2月9日以降CVE-2020-1472のセキュリティアップデートによって強制フェーズにより無効化(Secure Channelを強制的に有効)するから… https://t.co/L4I260hCiR https://twitter.com/i/web/status/1302247072570114049number3to4
2020-08-28 18:40:05CVE-2020-1472 https://t.co/BmC2HtUEmi #HarsiaInfo https://har-sia.info/CVE-2020-1472.htmlHar_sia
2020-08-28 01:40:02これって古いまま使っていると有効のままなの?どうだっけ? / “Yurika on Twitter: "8月の月例更新プログラムで出したAD環境のNetlogonの特権昇格の脆弱性CVE-2020-1472は、早期適用を強く強く推… https://t.co/QO9TyY2fwX https://twitter.com/i/web/status/1299159257439297536waiha8
2020-08-28 01:00:068月の月例更新プログラムで出したAD環境のNetlogonの特権昇格の脆弱性CVE-2020-1472は、早期適用を強く強く推奨です。認証なしユーザーがドメイン管理者へ特権昇格可能です。ゼロデイではありませんが未対応の方はぜひ早急… https://t.co/HEIVzfSA4W https://twitter.com/i/web/status/1299147725611520000EurekaBerry
2020-08-28 00:10:02[AD 管理者] 8月の月例のセキュリティ更新にて、NetLogonの脆弱性(CVE-2020-1472)に対する、DC向けの重要なセキュリティ情報を公開しています。マイクロソフトから公開している情報にてお客様環境で必要な対応をご… https://t.co/RMURoqWeL3 https://twitter.com/i/web/status/1299137102332997634JSECTEAM
2020-08-27 20:20:04CVE-2020-1472 | #Vulnérabilité d’élévation de privilèges dans #NetLogon / #Faille de #securite… https://t.co/LYyQ91ELD9 https://twitter.com/i/web/status/1299077846149857280PatriceLopez83
2020-08-27 16:00:03Microsoft’s August 2020 patch for CVE-2020-1472 - Netlogon Elevation of Privilege Vulnerability can cause business… https://t.co/Vgliu8oSUc https://twitter.com/i/web/status/1299013561096835073KrollWire
2020-08-24 18:40:08New post from https://t.co/9KYxtdZjkl (CVE-2020-1472 (windows_server_2008, windows_server_2012, windows_server_2016… https://t.co/JwOb8ytChF http://www.sesin.at https://twitter.com/i/web/status/1297965738095935491www_sesin_at
2020-08-24 18:40:07New post from https://t.co/uXvPWJy6tj (CVE-2020-1472 (windows_server_2008, windows_server_2012, windows_server_2016… https://t.co/8T5alLA2ey http://www.sesin.at https://twitter.com/i/web/status/1297965804525432833WolfgangSesin
2020-08-22 06:50:03CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability. „This security update addresses the vulnerability by… https://t.co/wSapTwp6OP https://twitter.com/i/web/status/1297062986167791617Deyda84
2020-08-21 13:10:05[Blog] CVE-2020-1472 : Vulnérabilité Microsoft NetLogon https://t.co/8kjS1gP9Ge #securite https://www.julienmousqueton.fr/cve-2020-1472-vulnerabilite-microsoft-netlogon/?utm_source=twitter&utm_medium=social&utm_campaign=zapierJMousqueton
2020-08-21 07:20:24Can't wait for the blog post. People vastly underestimated CVE-2020-1472... for now. https://t.co/3F3e6KfVBG https://twitter.com/SecuraBV/status/1295325366224138240newsoft
2020-08-18 16:36:12CVE-2020-1472 | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon s… https://t.co/H5dQOYdoLD https://twitter.com/i/web/status/1295458838016131072ZeroSecVulns
2020-08-18 16:35:33CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon sec… https://t.co/j1G4vKVJ3f https://twitter.com/i/web/status/1295461729221193728CVEnew
2020-08-18 13:00:06New post from https://t.co/uXvPWJy6tj (CVE-2020-1472) has been published on https://t.co/DbhrdwXdT7 http://www.sesin.at https://www.sesin.at/2020/08/18/cve-2020-1472/WolfgangSesin
2020-08-18 13:00:03New post from https://t.co/9KYxtdZjkl (CVE-2020-1472) has been published on https://t.co/zmDEXKtw6x http://www.sesin.at https://www.sesin.at/2020/08/18/cve-2020-1472/www_sesin_at
2020-08-17 22:20:07CVE-2020-1472 is called Wattled Lathe https://t.co/VuWWpkGXeE https://nvd.nist.gov/vuln/detail/CVE-2020-1472vulnonym
2020-08-17 13:20:04@RyanLNewington A few clarifications regarding some speculation about CVE-2020-1472: https://t.co/bZeaiXtOPv https://twitter.com/SecuraBV/status/1295325366224138240djrevmoon
2020-08-17 13:10:08@hackthebox_eu CVE-2020-1472 because it doesn't have a cool name and a logoolivier_boschko
2020-08-17 09:50:03Security vulnerability update CVE-2020-1472 released by Microsoft on August 11, 2020 in order to secure the AD infr… https://t.co/1JsPm8wZov https://twitter.com/i/web/status/1295294886195818497nocagile
2020-08-15 15:26:48@d4rckh Namaste, here is your unroll: @RyanLNewington: Here's a digest of my understanding of #CVE-2020-1472 for th… https://t.co/M6HVMkKog4 https://twitter.com/i/web/status/1293635701939085315threadreaderapp
2020-08-14 19:20:11Microsoft Security Advisory - Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) https://t.co/I2NlOwsNn2 https://t.co/VgBMBvRY1o http://newsbythehour.org/cybr http://bit.ly/3gKzvuCeverythingcybr
2020-08-14 13:00:03Ermanno Goletto CVE-2020-1472 – Netlogon Elevation of Privilege Vulnerability https://t.co/EqB9uhKeQz https://t.co/brBtXhiSqP https://www.devadmin.it/2020/08/14/cve-2020-1472-netlogon-elevation-of-privilege-vulnerability/ http://ifttt.com/images/no_image_card.pngictpower_it
2020-08-14 12:20:03How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/55BHAGaEsD https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocrodtrent
2020-08-13 23:50:05Tracked as 'CVE-2020-1472,' the vulnerability can be exploited by unauthenticated attackers to use Netlogon Remote… https://t.co/s45kIDI9Y8 https://twitter.com/i/web/status/1294056974712102912Null0x00Bytes
2020-08-13 16:40:03The full fix for CVE-2020-1472, assuming your DC has the August update: [Net.ServicePointManager]::SecurityProtoco… https://t.co/ln8F3Fb6co https://twitter.com/i/web/status/1293948542294331393rhymeswithmogul
2020-08-13 13:00:16Time to Patch! It is time to patch a critical-risk vulnerability (CVE-2020-1472) in your Domain Controller, a vulne… https://t.co/jOoepWsDzE https://twitter.com/i/web/status/1293894703776174081Improsec
2020-08-13 12:30:37@mikas_khb Михаил, диаграммы показывают среду, в которой все Windows Server КД защищены от CVE-2020-1472. Для этого… https://t.co/2DYI1fWmb8 https://twitter.com/i/web/status/1293885571195195394ArtyomSinitsyn
2020-08-13 09:00:06CVE-2020-1472: NetLogon Privilege Escalation Vulnerability Alert: On August 11, 2020, Windows officially released a… https://t.co/Q0Vzaqws6B https://twitter.com/i/web/status/1293832940955213824morodog
2020-08-13 07:20:03@ArtyomSinitsyn CVE-2020-1472 на слайде нет варианта: "патченный DC на винде" и "непатченный DC на винде", что буде… https://t.co/9XECqFbCoR https://twitter.com/i/web/status/1293808829893881856mikas_khb
2020-08-13 01:30:03The full fix for CVE-2020-1472, assuming your DC is updated: [Net.ServicePointManager]::SecurityProtocol=[Net.Secu… https://t.co/7O2w6s9XJ1 https://twitter.com/i/web/status/1293720766710775817rhymeswithmogul
2020-08-12 22:00:04CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability https://t.co/MerU2GAfzX https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472K3RN3L__P4N1C
2020-08-12 21:40:04Huge Domain Controller zero day exploit (CVE-2020-1472), patch DC's as fast as possible and keep an close eye for E… https://t.co/rFNkLQAp4M https://twitter.com/i/web/status/1293663009710190594Rene_Dissel
2020-08-12 20:10:05New post in https://t.co/1F9xRsdlML: CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability… https://t.co/X6FmZP1Hpk http://canyoupwn.me https://twitter.com/i/web/status/1293640142369042432cypmsecnews
2020-08-12 19:50:18How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/JjC15ViCIs https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocDavidHardcore69
2020-08-12 16:20:07@msftsecresponse do we have to deploy CVE-2020-1472 to fully-patched-through-July Windows 10/Server (2012/2016/2019… https://t.co/7BpMTg5QWl https://twitter.com/i/web/status/1293581956307914752jrh7675
2020-08-12 14:00:10A parchar sus controladores de dominio, señores: CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability… https://t.co/g4TI11X4bk https://twitter.com/i/web/status/1293545514747731975dagamone
2020-08-12 12:20:08@ArtyomSinitsyn CVE-2020-1472 на схеме нет варианта патченный ДЦ на винде и непатченный ДЦ на винде, что будет если… https://t.co/vN8D9baFQs https://twitter.com/i/web/status/1293521155882733570mikas_khb
2020-08-12 09:50:19Microsoft Security Advisory - Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) https://t.co/K7Ik6OVtfa… https://t.co/wkjEdMxWeQ https://ift.tt/3ix6C5z https://twitter.com/i/web/status/1293482695100637185rtcz_io
2020-08-12 09:00:15#News CVE-2020-1472: NetLogon Privilege Escalation Vulnerability Alert: On August 11, 2020, Windows officially rele… https://t.co/Qw6p8w37jp https://twitter.com/i/web/status/1293470052964999168morodog
2020-08-12 08:50:06Ny sårbarhed i MS-NRPC (CVE-2020-1472) . Følg anbefalingerne til brug af Secure RPC. Patchen vil skrive til dine… https://t.co/3taPCpBC2x https://twitter.com/i/web/status/1293469305573642240CFCSsitcen
2020-08-12 08:41:06Hey blue team buddies. Has anyone got any suggestions on how to monitor for CVE-2020-1472 ?nemesis09
2020-08-12 07:10:06Here's a digest of my understanding of #CVE-2020-1472 for the Microsoft Netlogon secure channel vulnerability and w… https://t.co/FRcU1O3Q7Q https://twitter.com/i/web/status/1293444103208722432RyanLNewington
2020-08-12 07:01:22Microsoft Security Advisory – Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) https://t.co/A2xBbJ0mPA http://hrbt.us/209374hardreboot
2020-08-12 07:00:54New post: "Microsoft Security Advisory - Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472)" https://t.co/iTfIraYAZk https://ift.tt/3gKzve6Myinfosecfeed
2020-08-12 07:00:30CVE-2020-1472, unauthenticated RCE on DC via vuln in Netlogon RPC. Network access seems to be the only requirement… https://t.co/EmlcvefrKj https://twitter.com/i/web/status/1293440980989902849cfalta
2020-08-12 06:30:18New post: CVE-2020-1472:NetLogon特权提升漏洞通告 https://t.co/U4KrIHH3UQ:netlogon特权提升漏洞通告/ https://reportcybercrime.com/cve-2020-1472digitpol_cyber
2020-08-12 06:30:07Microsoft Security Advisory - Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) https://t.co/IkKbYKHyyc https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472_r_netsec
2020-08-12 06:20:22Esta claro que 2020 lo estamos jugando en dificultad "venga ya": https://t.co/jDnjdkaocW CVE-2020-1472 - NetLogon… https://t.co/JTdB6YHXfR https://www.thezdi.com/blog/2020/8/11/the-august-2020-security-update-review https://twitter.com/i/web/status/1293429607190978560antoniosanzalc
2020-08-12 04:50:04Windows Server received a partial fix for CVE-2020-1472, which could allow an unauthenticated attacker to gain admi… https://t.co/VlkIA0M3N4 https://twitter.com/i/web/status/1293407752753156096aburassen2
2020-08-12 04:30:05CVE-2020-1472: NetLogon Privilege Escalation Vulnerability Alert https://t.co/tQxEVVsm22 #info #news #tech https://meterpreter.org/cve-2020-1472-netlogon-privilege-escalation-vulnerability-alert/the_yellow_fall
2020-08-12 04:10:03New post: CVE-2020-1472: NetLogon特权提升漏洞通告 – 360CERT https://t.co/Npihp34YQR特权提升漏洞通告-360cert/ https://reportcybercrime.com/cve-2020-1472-netlogondigitpol_cyber
2020-08-12 03:40:02CVE-2020-1472 Netlogon EoP vulnerability Upon successful exploitation, the *unauthenticated* attacker could gain do… https://t.co/pv29T0ocEg https://twitter.com/i/web/status/1293391725394685958maxxxie74
2020-08-12 02:30:03影響が大きそうなセキュリティ更新プログラム(CVE-2020-1472)がリリースされそうですね。。。 https://t.co/QaOyImOJiZ https://twitter.com/JSECTEAM/status/1293323569661906947deepyear
2020-08-12 02:20:03CVE-2020-1472 https://t.co/lj2itGugxT https://lnkd.in/gUW2WtEyamami_117
2020-08-12 02:00:03Has anyone who has deployed the patch for CVE-2020-1472 found devices that are reported as using insecure ms-nrpc?RyanLNewington
2020-08-12 01:30:02CVE-2020-1472 なにこれSergeant_sw
2020-08-12 00:00:08CVE-2020-1472 (NetLogon)はCVSS10.0 DCにパッチ適用でドメイン内のWindows端末はSecureRPCのsecure channelに切り替わり対応OK。ドメイン内の非Windowsの端末はSec… https://t.co/Ti1nPbJRuD https://twitter.com/i/web/status/1293334048924790784EurekaBerry
2020-08-11 22:20:05Hhmmm... CVE-2020-1472🤤 Élévation de privilèges sans authentification via le protocole RPC sur les contrôleurs de… https://t.co/J7VcbV9V8d https://twitter.com/i/web/status/1293309460363063297jdidi3r
2020-08-11 20:50:27A Microsoft MVP's work is never done. Now started to address Netlogon vulnerability CVE-2020-1472 #MVPBuzz #patchtuesdayWorkingHardInIT
2020-08-11 20:50:25@girlgerms to cheer you up - already started to address Netlogon vulnerability CVE-2020-1472WorkingHardInIT
2020-08-11 20:50:02I am disapointed CVE-2020-1472 does not have a cool name and a logo. Something like BlueRPCBleedel_d33
2020-08-11 19:10:12CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability https://t.co/MPEHCYdkdT https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-14720xdea
2020-08-11 18:40:06Do I read MS' bulletin for CVE-2020-1472 correctly ? "To exploit the vulnerability, an unauthenticated attacker w… https://t.co/vEJZikOTY2 https://twitter.com/i/web/status/1293255214557007878_trou_
2020-08-11 18:20:03How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 #infosec… https://t.co/GCsdQmf4Lf https://twitter.com/i/web/status/1293250828720119808rootsecdev
2020-08-11 18:10:03How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 https://t.co/7FqkHI4OY5 https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assocgN3mes1s
2020-08-06 22:50:19CVE-2020-1472 master 1 branch 0 tags Go to file ... https://t.co/2GZi59Hte3 http://vulmon.com/vulnerabilitydetails?qid=CVE-2020-1472VulmonFeeds