mirror of
https://github.com/HackTricks-wiki/hacktricks.git
synced 2025-10-10 18:36:50 +00:00
f
This commit is contained in:
parent
651f61fb65
commit
aefca42aeb
@ -18,7 +18,7 @@ To identify the members of this group, the following command is executed:
|
||||
Get-NetGroupMember -Identity "Account Operators" -Recurse
|
||||
```
|
||||
|
||||
Adding new users is permitted, as well as local login to DC01.
|
||||
Adding new users is permitted, as well as local login to the DC.
|
||||
|
||||
## AdminSDHolder group
|
||||
|
||||
@ -164,7 +164,10 @@ To list members of the DnsAdmins group, use:
|
||||
Get-NetGroupMember -Identity "DnsAdmins" -Recurse
|
||||
```
|
||||
|
||||
### Execute arbitrary DLL
|
||||
### Execute arbitrary DLL (CVE‑2021‑40469)
|
||||
|
||||
> [!NOTE]
|
||||
> This vulnerability allows for the execution of arbitrary code with SYSTEM privileges in the DNS service (usually inside the DCs). This issue was fixed in 2021.
|
||||
|
||||
Members can make the DNS server load an arbitrary DLL (either locally or from a remote share) using commands such as:
|
||||
|
||||
@ -242,6 +245,10 @@ sc.exe start MozillaMaintenance
|
||||
|
||||
Note: Hard link exploitation has been mitigated in recent Windows updates.
|
||||
|
||||
## Group Policy Creators Owners
|
||||
|
||||
This group allows members to create Group Policies in the domain. However, its members can't apply group policies to users or group or edit existing GPOs.
|
||||
|
||||
## Organization Management
|
||||
|
||||
In environments where **Microsoft Exchange** is deployed, a special group known as **Organization Management** holds significant capabilities. This group is privileged to **access the mailboxes of all domain users** and maintains **full control over the 'Microsoft Exchange Security Groups'** Organizational Unit (OU). This control includes the **`Exchange Windows Permissions`** group, which can be exploited for privilege escalation.
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user