Write Property
WriteDACL
Find domain groups that current user has WriteDACL
access right to:
The attacker can take the full control of discovered groups and then add a users to them:
Group membership will take its sweet time to be updated within target user's TGT. To force the update one may purge existing tickets and request new TGT:
WriteOwner on Group
before the attack the owner of Domain Admins is Domain Admins. After the ACE enumeration, if we find that a user in our control has WriteOwner
rights on ObjectType:All
we can change the Domain Admins
object's owner to our user, which in our case is spotless
. Note that the SID specified with -Identity
is the SID of the Domain Admins
group:
GenericWrite on User
WriteProperty
on an ObjectType
, which in this particular case is Script-Path
, allows the attacker to overwrite the logon script path of the delegate
user, which means that the next time, when the user delegate
logs on, their system will execute our malicious script:
the user's
logon script field gets updated in the AD.delegate
WriteDACL + WriteOwner
If you are the owner of a group And you have a WriteDACL
on that AD object, you can give yourself GenericAll
privileges with a sprinkle of ADSI sorcery:
Which means you now fully control the AD object.
This effectively means that you can now add new users to the group.
Interesting to note that I could not abuse these privileges by using Active Directory module and Set-Acl
/ Get-Acl
cmdlets:
Last updated