Table of Contents

Premise

In this video walk-through, we went over an Active Directory Windows where we have been able to gain domain controller access by exploiting the DNS Admin group to which we were able to add a non-privileged user.

The scenario shows how Microsoft Active Directory features are vulnerable to several attacks due to its various required settings to be configured.

Machine Name: Brute

Operating System: Windows Server with Active Directory

Difficulty: Medium

Created by : wtfitsaduck

Skills Learned

  • ASREProasting
  • Kerberute
  • Privilege Escalation

OSCP Certificate Notes

Windows Active Directory Penetration Testing Study Notes

Challenge

Cyberseclabs Brute

Video Walkthrough

About the Author

Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.

View Articles