DnsAdmins
Last updated
Was this helpful?
Last updated
Was this helpful?
This membership can be exploited by performing a DLL injection, i.e. specifying a plugin DLL that can be loaded upon (re)starting the DNS service.
Generate a malicious DLL and to the target.
Passing any payload this way crashes the DNS server as it never really starts. More information on how to bypass this issue by executing the payload as a thread .
Set the DLL path from the compromised host and restart the DNS service (DnsAdmins cannot restart services by default, but it not uncommon to be given that right).
Restart the DNS service. DnsAdmins
members cannot restart services by default using sc
, but they can do it with dnscmd
.
For an example of the above process check .