DNS Admins
Using DNS Admins for privilege escalation in Active Directory with PowerView and Mimikatz. The technique abuses the privileges given by default to the members of the DNS Admins group.
OPSEC NOTE : this technique is very risky and easily detectable as it requires a restart in DNS service.
Conditions
Members of the DNS Admins group can load arbitrary DLL’s with the privileges of dns.exe (SYSTEM)
If the DC serves as DNS server, we can escalate to DA
But: need to be able to restart the DNS on the DC !!!
Exploitation
The attack vector consists of injecting a malicious DLL into the DNS process running as a System to escalate when the service restarts.
Last updated