OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself.
OS-WINDOWS Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt
This rule looks for a malicious NetrServerAuthenticate3 request encapsulated in an SMB2 request that can exploit ZEROLOGON.
This rule looks for attempts to exploit CVE-2020-1472, aka ZEROLOGON.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Authentication Bypass
An Authentication Bypass occurs when there is a way to avoid providing user credentials to a system before performing restricted operations on said system.
CVE-2020-1472 |
Loading description
|
Tactic: Initial Access
Technique: Exploit Public-Facing Application
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org