Abusing AdminSDHolder for Persistence
Last updated
Was this helpful?
Last updated
Was this helpful?
AdminSDHolder
is a special AD container with some "default" security permissions that is used as a template for protected AD accounts and groups (like Domain Admins, Enterprise Admins, etc.) to prevent their accidental and unintended modifications, and to keep them secure.
AdminSDHolder
is an object located in the System Partition in Active Directory cn=adminsdholder,cn=system,dc=domain,dc=com
and is used as a security template for objects that are members of certain privileged groups. Objects in these groups are enumerated and any objects with security descriptors that don’t match the AdminSDHolder ACL are flagged for updating. The Security Descriptor propagator (SDProp) process runs every 60 minutes on the PDC Emulator and re-stamps the object Access Control List (ACL) with the security permissions set on the AdminSDHolder.
Once you have agained Domain Admin privileges, AdminSDHolder
container can be abused by backdooring it by giving your user GenericAll
privileges, which effectively makes that user a Domain Admin.
Abusing the AdminSDHolder container with PowerView
by adding an ACL that provides user fcastel
with GenericAll
rights for Domain Admins
group:
Now we should wait for 60 min so the changes will propagate automatically we need to force it to change less than this time we can do that using Invoke-SDPropagator.ps1
Now, confirming that the user fcastel
has got GenericAll
privileges against Domain Admins
group:
we can abuse this to get rights for DCSync
Execute DCSync: