Premise

In this video walk-through, we went over an Active Directory Windows where we have been able to gain domain controller access by exploiting the DNS Admin group to which we were able to add a non-privileged user.

The scenario shows how Microsoft Active Directory features are vulnerable to several attacks due to its various required settings to be configured.

Machine Name: Brute

Operating System: Windows Server with Active Directory

Difficulty: Medium

Created by : wtfitsaduck

Skills Learned

  • ASREProasting
  • Kerberute
  • Privilege Escalation

Get OSCP Certificate Notes

Challenge

Cyberseclabs Brute

Video Walkthrough

About the Author

I create cybersecurity notes, digital marketing notes and online courses. I also provide digital marketing consulting including but not limited to SEO, Google & Meta ads and CRM administration.

View Articles