Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improvable path to Domain Admins? #136

Closed
KenjiEndo15 opened this issue May 10, 2024 · 0 comments
Closed

Improvable path to Domain Admins? #136

KenjiEndo15 opened this issue May 10, 2024 · 0 comments

Comments

@KenjiEndo15
Copy link

KenjiEndo15 commented May 10, 2024

I just tested AD-miner on my personal lab and found out that there may be an incomplete/incorrect short-cut.

Lets say we own the walter.white user which has a GenericAll on the Users container as shown below:
da

According to AD-miner, we could get to the Domain Admins group, which I think is not feasable (even though it's a member of the container). The exploitation steps could be as below:

  1. Change the inheritance in the Users container to "This object and all descendant objects" (we assume it previously was "This object only").
  2. The difficulty starts from here: In an ideal world we could add ourselves to the Domain Admins group. However, since this group has by default AdminCount=1, it won't inherit ACEs from their parents containers or OU ; so we can't. There are some groups that can be abused to become domain admin such as the Cert Publishers group under some circumstances or maybe the Group Policy Creator Owners group (I believe, I haven't tested).

My take on this: If my analysis is right, then I believe this path should not be so straightforward. Having a GenericAll privilege on the Users container means we can reach some Tier-0 groups that are not protected by this AdminCount=1. So, I think it may be better to either point out these groups directly, or create a transitive link from these groups to the Domain Admins group if there's indeed a path.

References:


Edit: I just realized it was probably due to how BloodHound works, rather than AD-miner. I think it's best to close the issue then 😅

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant