Skip to content

Convenient shell script wrappers around bloodyAD, pyGPOAbuse, and impacket-dacledit to make DACL misconfigurations on GPOs slightly easier to exploit

Notifications You must be signed in to change notification settings

kennystrawnmusic/BashGPOAbuse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 

Repository files navigation

BashGPOAbuse

Convenient shell script wrappers around bloodyAD, pyGPOAbuse, and impacket-dacledit to make DACL misconfigurations on Active Directory Group Policy Objects (GPOs) slightly easier to exploit

Components:

  • gplink.sh — uses bloodyAD to streamline the process of linking and immediately enabling GPOs from a Linux machine (it's incredibly difficult otherwise) by writing to LDAP directly
  • localadmin.sh — abuses GPOs to make your compromised user the local admin either on every machine in an OU or, if the --site parameter is applied, on every machine throughout the domain including all domain controllers
  • revshell.sh — abuses GPOs to spawn a reverse shell with TrustedInstaller privileges
  • More to come

About

Convenient shell script wrappers around bloodyAD, pyGPOAbuse, and impacket-dacledit to make DACL misconfigurations on GPOs slightly easier to exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages