Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory Logo

Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory

0
Free
Visit Website

This lab demonstrates how to escalate privileges in an Active Directory environment by abusing the DNSAdmins privilege. The lab explains how a user who is a member of the DNSAdmins group or has write privileges to a DNS server object can load an arbitrary DLL with SYSTEM privileges on the DNS server. The lab setup includes enumerating users who are part of the DNSAdmins group using PowerView and targeting the buildadmin user in a real-world scenario.

FEATURES

ALTERNATIVES

A library utilizing Z3 prover to analyze AWS IAM policies.

Free

Find leaked credentials by scanning repositories for high entropy strings.

Free

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial

Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.

Free

An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.

Free

A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

Free

This article discusses protected accounts and groups in Active Directory, providing examples and screenshots to illustrate key concepts.

Free

Okta Customer Identity Cloud is a CIAM solution that provides secure, customizable identity management for consumer and SaaS applications.

Commercial
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved