URL details: www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html

URL title: Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory
URL paragraphs: Home of Nikhil "SamratAshok" Mittal PS C:\> Get-NetGroupMember -GroupName "DNSAdmins" In a real red team or pentest, the next step would be to target the buildadmin user. We can find a box where token of buildadmin is available using Invoke-UserHunter from
URL last crawled: 2024-07-23
URL speed: 1.350 MB/s, downloaded in 0.060 seconds

open external url

1 external links to this url

Only links from external domains are shown on this page.

found date
link text
from url
2023-01-07
my post