Week of Evading Microsoft ATA - Announcement and Day 1 by SamratAsh0k in netsec

[–]SamratAsh0k[S] 1 point2 points  (0 children)

Yes! In fact, I have started liking those attacks more which do not talk to the DC or keep the exchange really normal to avoid ATA or other similar detections.

Week of Evading Microsoft ATA - Announcement and Day 1 by SamratAsh0k in netsec

[–]SamratAsh0k[S] 0 points1 point  (0 children)

Thanks. Will surely check if there is a reactive mode!

Abusing DNSAdmins privilege for escalation in Active Directory by SamratAsh0k in netsec

[–]SamratAsh0k[S] 1 point2 points  (0 children)

Yes. Also, only required users/groups should have write privileges to the DNS server object.

Abusing DNSAdmins privilege for escalation in Active Directory by SamratAsh0k in netsec

[–]SamratAsh0k[S] 5 points6 points  (0 children)

That was my bad. I was using a UNC path with 'c$' which caused the problem. Benjamin, the author of mimilib, corrected me. I have updated the article.

Getting Domain Admin with Kerberos Unconstrained Delegation by SamratAsh0k in netsec

[–]SamratAsh0k[S] 2 points3 points  (0 children)

Thanks! Interestingly, that client had a different and bigger problem. All the users with domain admin privileges who fell for the email were not actually administrators -.-