You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Explore how attackers abuse default groups (DnsAdmins, Schema Admins, Server Operators, Backup Operators, etc.) to elevate privileges, maintain persistence, and execute payloads in domain servers and hosts,
The content you are editing has changed. Please copy your edits and refresh the page.
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
Summary
Explore how attackers abuse default groups (
DnsAdmins
,Schema Admins
,Server Operators
,Backup Operators
, etc.) to elevate privileges, maintain persistence, and execute payloads in domain servers and hosts,Tasks
Goals
Resources:
https://adsecurity.org/?p=3700
https://cube0x0.github.io/Pocing-Beyond-DA/
https://adsecurity.org/?p=4064
https://github.com/gtworek/PSBits/tree/master/ServerLevelPluginDll
PRs
The text was updated successfully, but these errors were encountered: