Builtin Groups
Theory
In the Windows Server operating system, there are several built-in accounts and security groups that are preconfigured with the appropriate rights and permissions to perform specific tasks. (Microsoft)
There are scenarios where testers can obtain full control over members of built-in security groups. The usual targets are members of the "Administrators", "Domain Admins" or "Entreprise Admins" groups, however, other groups can sometimes lead to major privileges escalation.
Practice
Below is a table summing up some groups' rights and abuse paths.
Account Operators
Administrators
full admin rights to the Active Directory domain and Domain Controllers
Backup Operators
Server Operators
its members can sign-in to a server, start and stop services, access domain controllers, perform maintenance tasks (such as backup and restore), and they have the ability to change binaries that are installed on the domain controllers
DnsAdmins
Domain Admins
full admin rights to the Active Directory domain, all computers, workstations, servers, users and so on
Enterprise Admins
full admin rights to all Active Directory domains in the AD forest
Schema Admins
modify the schema structure of the Active Directory. Only the objects created after the modification are affected.
Group Policy Creators Owners
create Group Policies in the domain. Its members can't apply group policies to users or group or edit existing GPOs
Cert Publishers
AD Recycle Bin
Resources
Last updated
Was this helpful?