You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
GPO contains many information like priviledges, ACE, password management, ...
It's important to parse at least GptTmpl.inf present in multiple SMB folders in \\CORP.lo\SYSVOL\.
Here an example of GptTmpl.inf, it indicate that domain users are allowed to RDP, that GPO was on the root OU. I was not able to view the usal path in Bloodhound.
This part means that where the GPO apply, all domain admins are not allowed to auth but Domain Users (S-1-5-21-1645522239-1214440339-682003330-513) are local admin and are allowed to auth.
There is also a part based on a file Group.xml for a full GPO analysis
RustHound and Bloodhound.py doesn't implement GPO analysis, this would be a very valuable contribution.
Thank you for all the information.
I have begun a function that will do this.
I will use an SMB lib to read the GptTmpl.inf and Group.xml files and to parse them.
GPO contains many information like priviledges, ACE, password management, ...
It's important to parse at least
GptTmpl.inf
present in multiple SMB folders in\\CORP.lo\SYSVOL\
.Here an example of
GptTmpl.inf
, it indicate that domain users are allowed to RDP, that GPO was on the rootOU
. I was not able to view the usal path in Bloodhound.All the parts are interesting, but this part is very, very interesting:
This part means that where the GPO apply, all domain admins are not allowed to auth but Domain Users (S-1-5-21-1645522239-1214440339-682003330-513) are local admin and are allowed to auth.
There is also a part based on a file Group.xml for a full GPO analysis
RustHound and Bloodhound.py doesn't implement GPO analysis, this would be a very valuable contribution.
Some documentation :
The text was updated successfully, but these errors were encountered: