Skip to main content

Whitepaper ZeroLogon

By 1 June 2020 July 22nd, 2021 Resources
rapport ZeroLogon kwetsbaarheid

Which three attack scenarios are possible after exploit of the ZeroLogon vulnerability?

We investigated three possible attack scenarios which an attacker could use after exploiting the ZeroLogon vulnerability. The T-CERT simulated each scenario to identify Indicators of Compromise which are related to these attack scenarios when carried out using the Mimikatz tool.

You can read about it in the whitepaper ZeroLogon: Exploit, Detect & Mitigate.

Tesorion gebruikt jouw gegevens voor het versturen van de gevraagde informatie en mogelijk telefonisch contact. Je kunt je op elk gewenst moment afmelden. Lees voor meer informatie ons privacybeleid.