In this video walk-through, we went over an Active Directory Windows where we have been able to gain domain controller access by exploiting the DNS Admin group to which we were able to add a non-privileged user.

The scenario shows how Microsoft Active Directory features are vulnerable to several attacks due to its various required settings to be configured.

Machine Name: Brute

Operating System: Windows Server with Active Directory

Difficulty: Medium

Created by : wtfitsaduck

Skills Learned

  • ASREProasting
  • Kerberute
  • Privilege Escalation

Get OSCP Certificate Notes


Cyberseclabs Brute

Video Walkthrough

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles