Abusing ACLs
Last updated
Last updated
With the privileges of a Domain Admin, we can change the ACL rights for any user we wish to maintain persistence in a network.
Depending on the rights you change and on whom you change them, this can be a stealthy technique provided that no code gets executed on the Domain Controller. One such method is to give a user replication rights to then execute DCSync with and extract the krbtgt hash.
I should note this technique could be easily spotted...
A much quieter technique than the above. It requires 3 rights to be given:
Replicating Directory Changes
Replicating Directory Changes All
Replicating Directory Changes in Filtered Set
Monitor Secutiry events:
4662 - Operations on objects
5136 - Modification of Objects
4670 - Changed Object Permissions