Attacking AD by abusing DNS vulnerabilities
Details
- Understanding and performing recon on the target network using port scanning tools.
- Identifying potential and critical targets to exploit.
- Connecting the dots to complete the attack chain: Exploiting DNS.
- Detecting such attacks using a holistic SIEM solution.
