GPOddity

GPOddity combines NTLM relaying with the modification of a GPO:

  1. The target user has WriteDACL over a GPO

  2. Relay credentials of the target user for modifying the path of the GP template (gPCFileSysPath)

  3. Load a malicious template from an attacker-controlled location

The GPOddity attack (image taken from the CRTP course).

The target user has WriteDACL over a GPO:

# Get GPO's details with PowerView
> Get-DomainGPO -identity "DevOps Policy"

displayname              : DevOps Policy
name                     : {0BF8D01C-1F62-4BDC-958C-57140B67D147}
cn                       : {0BF8D01C-1F62-4BDC-958C-57140B67D147}
objectguid               : fc0df125-5e26-4794-93c7-e60c6eecb75f
gpcfilesyspath           : \\dollarcorp.moneycorp.local\SysVol\dollarcorp.moneycorp.local\Policies\{0BF8D01C-1F62-4BDC-958C-57140B67D147}
distinguishedname        : CN={0BF8D01C-1F62-4BDC-958C-57140B67D147},CN=Policies,CN=System,DC=dollarcorp,DC=moneycorp,DC=local
objectcategory           : CN=Group-Policy-Container,CN=Schema,CN=Configuration,DC=moneycorp,DC=local

Last updated

Was this helpful?