You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
a GPO folder writable by "Domain Users" located at \\corp.lo\SYSVOL\corp.lo\Policies\{00D0CA88-64A5-4765-A9C5-7CA0D8C27265}\
a script in \\corp.lo\SYSVOL\corp.lo\scripts\xxxxx.vbs writable also by "Domain Users"
It would be a good idea to collect the ACLs of SMB shares. Especially those linked to domain controllers.
However, this idea implies the addition of new objects not referenced by Bloodhound. In my lab, I got around the problem by hand, creating GPOs like for certificates.
I have done this trick via smbclient.py (impacket) and ugly insert directly in neo4j
During an audit, I discovered:
\\corp.lo\SYSVOL\corp.lo\Policies\{00D0CA88-64A5-4765-A9C5-7CA0D8C27265}\
\\corp.lo\SYSVOL\corp.lo\scripts\xxxxx.vbs
writable also by "Domain Users"It would be a good idea to collect the ACLs of SMB shares. Especially those linked to domain controllers.
However, this idea implies the addition of new objects not referenced by Bloodhound. In my lab, I got around the problem by hand, creating GPOs like for certificates.
I have done this trick via smbclient.py (impacket) and ugly insert directly in neo4j
But ideally I imagine somethings like:
The text was updated successfully, but these errors were encountered: