DNSAdmins
Theory
Members of the built-in DNSAdmin group can read, write, create, delete DNS records (e.g. edit the wildcard record if it already exists). Its members can also run code via DLL on a Domain Controller operating as a DNS server (CVE-2021-40469).
The attack relies on a DLL injection into the dns service running as SYSTEM on the DNS server which most of the time is on a Domain Contoller which in this case implicate a domain compromise.
You must be member of the DnsAdmins group to perform this attack.
Practice
First, generate a DLL to inject
Now we can replace the service's dll
You can know trigger the exploit by restarting the dns service.
References
Last updated