Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory Logo

Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory

0
Free
Visit Website

This lab demonstrates how to escalate privileges in an Active Directory environment by abusing the DNSAdmins privilege. The lab explains how a user who is a member of the DNSAdmins group or has write privileges to a DNS server object can load an arbitrary DLL with SYSTEM privileges on the DNS server. The lab setup includes enumerating users who are part of the DNSAdmins group using PowerView and targeting the buildadmin user in a real-world scenario.

FEATURES

ALTERNATIVES

A platform that discovers, manages and secures non-human identities like service accounts, API keys and secrets across enterprise environments.

Commercial

AWS IAM Security Assessment tool for identifying violations of least privilege and generating risk-prioritized reports.

Free

A library utilizing Z3 prover to analyze AWS IAM policies.

Free

An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.

Free

Certbot is a free tool for automatically enabling HTTPS on websites using Let's Encrypt certificates.

Free

Find leaked credentials by scanning repositories for high entropy strings.

Free

Helm plugin for decrypting encrypted Helm value files on the fly and integrating with cloud native secret managers.

Free

Command-line password manager with GnuPG encryption and colorful interface.

Free