Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Meta] Explore Detection Opportunities on Active Directory Default Groups Abuse #3005

Closed
5 tasks done
w0rk3r opened this issue Aug 9, 2023 · 2 comments
Closed
5 tasks done
Assignees
Labels
backlog Meta OS: Windows windows related rules Rule: New Proposal for new rule

Comments

@w0rk3r
Copy link
Contributor

w0rk3r commented Aug 9, 2023

Summary

Explore how attackers abuse default groups (DnsAdmins, Schema Admins, Server Operators, Backup Operators, etc.) to elevate privileges, maintain persistence, and execute payloads in domain servers and hosts,

Tasks

Preview Give feedback

Goals

  • Enhance coverage for attacks that target common misconfigurations in active directory environments.

Resources:

https://adsecurity.org/?p=3700
https://cube0x0.github.io/Pocing-Beyond-DA/
https://adsecurity.org/?p=4064
https://github.com/gtworek/PSBits/tree/master/ServerLevelPluginDll

PRs

@w0rk3r w0rk3r added OS: Windows windows related rules Meta labels Aug 9, 2023
@w0rk3r w0rk3r self-assigned this Aug 9, 2023
@botelastic
Copy link

botelastic bot commented Oct 8, 2023

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@w0rk3r
Copy link
Contributor Author

w0rk3r commented Jun 26, 2024

Closing this one as the scoped work is completed.

@w0rk3r w0rk3r closed this as completed Jun 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backlog Meta OS: Windows windows related rules Rule: New Proposal for new rule
Projects
None yet
Development

No branches or pull requests

2 participants