Closed w0rk3r closed 4 months ago
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
Closing this one as the scoped work is completed.
Summary
Explore how attackers abuse default groups (
DnsAdmins
,Schema Admins
,Server Operators
,Backup Operators
, etc.) to elevate privileges, maintain persistence, and execute payloads in domain servers and hosts,Goals
Resources:
https://adsecurity.org/?p=3700 https://cube0x0.github.io/Pocing-Beyond-DA/ https://adsecurity.org/?p=4064 https://github.com/gtworek/PSBits/tree/master/ServerLevelPluginDll
PRs