Attacking AD by exploiting a DNS vulnerability
Details
- Understanding and performing recon on the target network using port scanning tools.
- Identifying potential and critical targets to exploit.
- Connecting the dots to complete the attack chain: Exploiting DNS.
- Detecting such attacks using a holistic SIEM solution.
Network Security
System Administration
Information Security
ITIL ITSM
Help Desk
