Subscribe via feed.

DnsAdmin ServerLevelPluginDll Feature Abuse Privilege Escalation

Posted by deepcore on September 12, 2020 – 9:53 am

This Metasploit module exploits a feature in the DNS service of Windows Server. Users of the DnsAdmins group can set the ServerLevelPluginDll value using dnscmd.exe to create a registry key at HKLMSYSTEMCurrentControlSetServicesDNSParameters named ServerLevelPluginDll that can be made to point to an arbitrary DLL.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.