ZeroLogon Detection Script

ZeroLogon Exploit Vulnerability Check


This script uses zeroLogon.exe to test the local machine to see if it is Vulnerable to ZeroLogon Exploit.

Details of zeroLogon.exe can be found here -

This script uses Kasseya to retrieve the details of the local machine, the netBIOS name and IP address, and passes this to the zeroLogon.exe.

The script will check that the osType is Windows Server 20?? and will only run on these machines.

This does not guarantee that they are suitable targets (AD Controllers).

zeroLogon.exe then runs and the SUCCESS ro FAILURE result is captured and an email is sent with the result.

NB. Line 1 of the procedure contains the target email address - please change this to an appropriate address for your organisation.

The result is also written to the script log for the agent for reporting purposes.

Special thanks to Secura (

zeroLogon.exe is a compiled version of their script, downloaded from here -

Secura's blog explains the exploit -

  • Name: Kaseya Automation Team
  • Company: Kaseya
  • Website:
  • Contact Developer
  • Summary
  • ZeroLogon Detection Script
  • Version:
  • Initially Released September 16th, 2020
  • Reviews

    ZeroLogon Detection Script has no reviews.

    Gravatar for Marc Friesen
    Marc Friesen 7 months ago

    Virustotal shows 3 malware detection engines list malicious code in this exe:

    Gravatar for Kaseya Automation Team
    Kaseya Automation Team 7 months ago

    Hello Marc,

    the exe provided is a compiled version of We ran this through our security filters and found no issues.

    Gravatar for Craig Hart
    Craig Hart 7 months ago

    Script doesn't work. always comes back inconclusive.

    No mention of hardcoded email address inside script instead of using #admindefaults.adminemail# to pick up the email address of the VSA admin running the script automatically.

    Gravatar for Kaseya Automation Team
    Kaseya Automation Team 7 months ago

    @Craig Hart

    The description does indicate the need to modify the email address.

    Regarding the inconclusiveness, please let me know more details about what you are facing.

    Gravatar for Nathan Harris
    Nathan Harris 7 months ago

    I'm getting the same output at Craig - INCONCLUSIVE on all tests

    Server 2016, DC roles, Result: "The system cannot execute the specified program."

    No A/V detection events

    Gravatar for Nathan Harris
    Nathan Harris 7 months ago

    For our part, the issues have been narrowed down. We identified a typo in the agent procedure on lines 9 & 10:

    #vAgentconfiguration.AgentTempDir#\zeroLogon.exe #machName# #ipAddress#

    should be

    #agentTemp#\zeroLogon.exe #machName# #ipAddress#

    Once corrected, in our unique case, our antivirus then caught and quarantined the .exe. Adding a filename exclusion in the AV management portal resolved this issue and tests are now running as intended.


    Nathan Harris