### [CVE-2021-42287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42287) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20%20Service%20Pack%202&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%202004&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%2020H2&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=10.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brightgreen) ### Description Active Directory Domain Services Elevation of Privilege Vulnerability ### POC #### Reference No PoCs from references. #### Github - https://github.com/0x7n6/OSCP - https://github.com/0xStrygwyr/OSCP-Guide - https://github.com/0xZipp0/OSCP - https://github.com/0xsyr0/OSCP - https://github.com/20142995/sectool - https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1 - https://github.com/AMatheusFeitosaM/OSCP-Cheat - https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets - https://github.com/ARPSyndicate/cvemon - https://github.com/AleHelp/Windows-Pentesting-cheatsheet - https://github.com/Amar224/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/Ascotbe/Kernelhub - https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/Awrrays/Pentest-Tips - https://github.com/AyoubSEG/Pentest-AD - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/Chrisync/CVE-Scanner - https://github.com/Cruxer8Mech/Idk - https://github.com/DanielBodnar/my-awesome-stars - https://github.com/DanielFEXKEX/CVE-Scanner - https://github.com/EnriqueSanchezdelVillar/NotesHck - https://github.com/EvilAnne/2021-Read-article - https://github.com/Faizan-Khanx/OSCP - https://github.com/GhostPack/Rubeus - https://github.com/GhostTroops/TOP - https://github.com/Gyarbij/xknow_infosec - https://github.com/H0j3n/EzpzCheatSheet - https://github.com/HackingCost/AD_Pentest - https://github.com/IAMinZoho/sAMAccountName-Spoofing - https://github.com/Iveco/xknow_infosec - https://github.com/JDArmy/GetDomainAdmin - https://github.com/JERRY123S/all-poc - https://github.com/JFR-C/Windows-Penetration-Testing - https://github.com/Jalexander798/JA_Tools-ActiveDirectory-Exploitation - https://github.com/Jean-Francois-C/Windows-Penetration-Testing - https://github.com/KFriitz/MyRuby - https://github.com/Kar0nX/ADtools - https://github.com/Kryo1/Pentest_Note - https://github.com/Ly0nt4r/OSCP - https://github.com/MGamalCYSEC/Active-Directory-Enumeration-and-Attacks - https://github.com/MadnetM/Rubeus-replica - https://github.com/Mehedi-Babu/active_directory_chtsht - https://github.com/Mohit0/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/OsandaMalith/Rubeus - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Pascal-0x90/Rubeus - https://github.com/Qazeer/OffensivePythonPipeline - https://github.com/ReAbout/web-sec - https://github.com/ReflectedThanatos/OSCP-cheatsheet - https://github.com/Ridter/noPac - https://github.com/RkDx/MyRuby - https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/S3cur3Th1sSh1t/My-starred-Repositories - https://github.com/SYRTI/POC_to_review - https://github.com/SantoriuHen/NotesHck - https://github.com/SenukDias/OSCP_cheat - https://github.com/Singhsanjeev617/A-Red-Teamer-diaries - https://github.com/SirElmard/ethical_hacking - https://github.com/Strokekilla/Rubeus - https://github.com/T0mcat3r/ALinks - https://github.com/Threekiii/Awesome-Redteam - https://github.com/TrojanAZhen/Self_Back - https://github.com/TryA9ain/noPac - https://github.com/VidyaBipin/Rubeus-CShrp-yara - https://github.com/ViniciusClement/OSCP_2025 - https://github.com/VishuGahlyan/OSCP - https://github.com/WazeHell/sam-the-admin - https://github.com/Whiteh4tWolf/Attack-Defense - https://github.com/WhooAmii/POC_to_review - https://github.com/XiaoliChan/Invoke-sAMSpoofing - https://github.com/YossiSassi/hAcKtive-Directory-Forensics - https://github.com/ZyberPatrol/Active-Directory - https://github.com/andreafiorella/red-team-scenario - https://github.com/angui0O/Awesome-Redteam - https://github.com/aymankhder/AD-attack-defense - https://github.com/aymankhder/AD-esploitation-cheatsheet - https://github.com/aymankhder/Windows-Penetration-Testing - https://github.com/bhataasim1/AD-Attack-Defence - https://github.com/blackend/Diario-RedTem - https://github.com/bohack/SecurityTools - https://github.com/brimstone/stars - https://github.com/csb21jb/Pentesting-Notes - https://github.com/cube0x0/noPac - https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/cyb3rpeace/noPac - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/cybersecurityworks553/noPac-detection - https://github.com/danielbodnar/my-awesome-stars - https://github.com/devmehedi101/bugbounty-CVE-Report - https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/e-hakson/OSCP - https://github.com/elinakrmova/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/eljosep/OSCP-Guide - https://github.com/exfilt/CheatSheet - https://github.com/fazilbaig1/oscp - https://github.com/getanehAl/Windows-Penetration-Testing - https://github.com/gkazimiarovich/CS-IDP-PatternId-table - https://github.com/goddemondemongod/Sec-Interview - https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense- - https://github.com/hangchuanin/Intranet_penetration_history - https://github.com/hegusung/netscan - https://github.com/hktalent/TOP - https://github.com/hktalent/bug-bounty - https://github.com/iamramahibrah/AD-Attacks-and-Defend - https://github.com/ihebski/A-Red-Teamer-diaries - https://github.com/infosecn1nja/AD-Attack-Defense - https://github.com/jbmihoub/all-poc - https://github.com/jenriquezv/OSCP-Cheat-Sheets-AD - https://github.com/jitmondal1/OSCP - https://github.com/jnjambrin0/test-rubeus - https://github.com/joker200-0/Rubeus - https://github.com/k8gege/Ladon - https://github.com/keshavskn123/CDAC - https://github.com/kgwanjala/oscp-cheatsheet - https://github.com/knightswd/NoPacScan - https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest - https://github.com/lawbyte/Windows-and-Active-Directory - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/ly4k/Pachine - https://github.com/lyshark/Windows-exploits - https://github.com/makoto56/penetration-suite-toolkit - https://github.com/merlinepedra/RUBEUS - https://github.com/merlinepedra/RUBEUS-1 - https://github.com/merlinepedra25/RUBEUS - https://github.com/merlinepedra25/RUBEUS-1 - https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense - https://github.com/mranv/adPentest - https://github.com/nadeemali79/AD-Attack-Defense - https://github.com/nholuongut/active-directory-exploitation-cheat-sheet - https://github.com/nitishbadole/oscp-note-3 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/open-source-agenda/new-open-source-projects - https://github.com/oscpname/OSCP_cheat - https://github.com/paramint/AD-Attack-Defense - https://github.com/parth45/cheatsheet - https://github.com/plzheheplztrying/cve_monitor - https://github.com/puckiestyle/A-Red-Teamer-diaries - https://github.com/puckiestyle/sam-the-admin - https://github.com/pwnlog/ALinks - https://github.com/pwnlog/PAD - https://github.com/pwnlog/PuroAD - https://github.com/pwnlog/PurpAD - https://github.com/qobil7681/Password-cracker - https://github.com/rajbhx/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/retr0-13/AD-Attack-Defense - https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/retr0-13/noPac - https://github.com/revanmalang/OSCP - https://github.com/ricardojba/Invoke-noPac - https://github.com/rodrigosilvaluz/JUST_WALKING_DOG - https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet - https://github.com/s3mPr1linux/JUST_WALKING_DOG - https://github.com/safebuffer/sam-the-admin - https://github.com/santan2020/ck2 - https://github.com/sdogancesur/log4j_github_repository - https://github.com/securi3ytalent/bugbounty-CVE-Report - https://github.com/sexyducati/rubeus-test - https://github.com/shengshengli/GetDomainAdmin - https://github.com/soosmile/POC - https://github.com/sponkmonk/Ladon_english_update - https://github.com/suljov/Windows-and-Active-Directory - https://github.com/suljov/Windwos-and-Active-Directory - https://github.com/suljov/suljov-Pentest-ctf-cheat-sheet - https://github.com/syedrizvinet/lib-repos-Rubeus - https://github.com/taielab/awesome-hacking-lists - https://github.com/theguly/stars - https://github.com/trhacknon/Pocingit - https://github.com/trhacknon/Rubeus - https://github.com/tufanturhan/Red-Teamer-Diaries - https://github.com/tufanturhan/sam-the-admin - https://github.com/txuswashere/OSCP - https://github.com/undefined-name12/Cheat-Sheet-Active-Directory - https://github.com/vanhohen/ADNinja - https://github.com/voker2311/Infra-Security-101 - https://github.com/waterrr/noPac - https://github.com/weeka10/-hktalent-TOP - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- - https://github.com/xhref/OSCP - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/yovelo98/OSCP-Cheatsheet - https://github.com/zecool/cve - https://github.com/zhanpengliu-tencent/medium-cve - https://github.com/zulloper/cve-poc