Premise
In this video walk-through, we went over an Active Directory Windows where we have been able to gain domain controller access by exploiting the DNS Admin group to which we were able to add a non-privileged user.
The scenario shows how Microsoft Active Directory features are vulnerable to several attacks due to its various required settings to be configured.
Machine Name: Brute
Operating System: Windows Server with Active Directory
Difficulty: Medium
Created by : wtfitsaduck
Skills Learned
- ASREProasting
- Kerberute
- Privilege Escalation
Windows Active Directory Penetration Testing Study Notes
Challenge
Video Walkthrough
Appreciate you sharing, great blog article. Thanks Again. Fantastic. Vernon Stouten