Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory
This lab demonstrates how to escalate privileges in an Active Directory environment by abusing the DNSAdmins privilege. The lab explains how a user who is a member of the DNSAdmins group or has write privileges to a DNS server object can load an arbitrary DLL with SYSTEM privileges on the DNS server. The lab setup includes enumerating users who are part of the DNSAdmins group using PowerView and targeting the buildadmin user in a real-world scenario.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.
A simple drop-in library for managing users, permissions, and groups in your application.
A list of Windows privilege escalation techniques, categorized and explained in detail.
A list of disposable email domains to detect or block disposable accounts