Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory
This lab demonstrates how to escalate privileges in an Active Directory environment by abusing the DNSAdmins privilege. The lab explains how a user who is a member of the DNSAdmins group or has write privileges to a DNS server object can load an arbitrary DLL with SYSTEM privileges on the DNS server. The lab setup includes enumerating users who are part of the DNSAdmins group using PowerView and targeting the buildadmin user in a real-world scenario.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
CLI for generating AWS IAM policy documents, SAM policy templates or SAM Connectors
Runs IAM policy linting checks against AWS accounts to identify security best practices and policy errors.
Jamf Connect is an identity and access management solution that provides cloud-based authentication, password synchronization, and Zero Trust Network Access for Mac and mobile devices.
This article discusses protected accounts and groups in Active Directory, providing examples and screenshots to illustrate key concepts.
Akamai Identity Cloud is a CIAM solution that manages customer identities, enhances user experiences, and ensures data protection and regulatory compliance for high-volume consumer brands.
A decentralized identity verification solution that enables organizations to issue, manage, and verify digital credentials for user-owned identity scenarios.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.