URL details: www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html
URL title:
Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory
URL paragraphs:
Home of Nikhil "SamratAshok" Mittal PS C:\> Get-NetGroupMember -GroupName "DNSAdmins" In a real red team or pentest, the next step would be to target the buildadmin user. We can find a box where token of buildadmin is available using Invoke-UserHunter from
URL last crawled:
2024-07-23
URL speed:
1.350 MB/s,
downloaded in 0.060 seconds
1 external links to this url
Only links from external domains are shown on this page.