Last updated
Was this helpful?
Last updated
Was this helpful?
Members of the built-in DNSAdmin group can read, write, create, delete DNS records (e.g. edit the if it already exists). Its members can also ().
The attack relies on a DLL injection into the dns service running as SYSTEM on the DNS server which most of the time is on a Domain Contoller which in this case implicate a domain compromise.
First, generate a DLL to inject
Now we can replace the service's dll
You can know trigger the exploit by restarting the dns service.