In this video walk-through, we went over an Active Directory Windows where we have been able to gain domain controller access by exploiting the DNS Admin group to which we were able to add a non-privileged user.

The scenario shows how Microsoft Active Directory features are vulnerable to several attacks due to its various required settings to be configured.

Machine Name: Brute

Operating System: Windows Server with Active Directory

Difficulty: Medium

Created by : wtfitsaduck

Skills Learned

  • ASREProasting
  • Kerberute
  • Privilege Escalation


Cyberseclabs Brute

Video Walkthrough

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles