Group policies
Theory
In certain scenarios, an attacker can gain control over GPOs. Some ACEs can give that control (see this BlackHat conf, page 28):
WriteProperty
to theGPC-File-Sys-Path
property of a GPO (specific GUID specified)GenericAll
,GenericWrite
,WriteProperty
to any property (no GUID specified)WriteDacl
,WriteOwner
This page is about enumeration, for GPO-based attacks, please refer to this page.
Practice
PowerView
We can enumerate interesting GPO's domain Object's ACL using Get-NetGPO
and Get-ObjectAcl
from Powersploit's Powerview.
Then, on your attacking machine, we can use the following command to format results
You may resolve computer names linked with a GPO as follow
Resources
Last updated