Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory Logo

Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory

0
Free
Visit Website

This lab demonstrates how to escalate privileges in an Active Directory environment by abusing the DNSAdmins privilege. The lab explains how a user who is a member of the DNSAdmins group or has write privileges to a DNS server object can load an arbitrary DLL with SYSTEM privileges on the DNS server. The lab setup includes enumerating users who are part of the DNSAdmins group using PowerView and targeting the buildadmin user in a real-world scenario.

FEATURES

ALTERNATIVES

A tool for finding AWS credentials in files, optimized for Jenkins integration.

Free

A web service for easier AWS IAM permissions and credential management with various login methods and IAM Self-Service Wizard.

Free

A tool for searching through public EBS snapshots for secrets, organized as an Elastic Beanstalk application.

Free

Open-source universal secret manager for developers with seamless integration to various cloud services and vaults.

Free

A fully automated AD build script that configures a domain fully with adjustable XML files.

Free

A simple drop-in library for managing users, permissions, and groups in your application.

Free

Centralized workforce identity management for AWS applications.

Free

Zoho Vault is a secure password management tool that allows you to store and automatically fill in passwords on websites and apps.

Commercial