Using SharpGPOAbuse
Windows
Table of Contents
https://github.com/FSecureLABS/SharpGPOAbuse
Usage
Attacks Types
Currently SharpGPOAbuse supports the following options:
Option | Description |
---|---|
--AddUserRights | Add rights to a user |
--AddLocalAdmin | Add a user to the local admins group |
--AddComputerScript | Add a new computer startup script |
--AddUserScript | Configure a user logon script |
--AddComputerTask | Configure a computer immediate task |
--AddUserTask | Add an immediate task to a user |
Attack Options
Adding User Rights
Adding a Local Admin
Configuring a User or Computer Logon Script
If you want to run the malicious script only on a specific user or computer controlled by the vulnerable GPO, you can add an if statement within the malicious script:
Configuring a Computer or User Immediate Task
If you want to run the malicious task only on a specific user or computer controlled by the vulnerable GPO you can use something similar to the following:
Additional Options
Option | Description |
---|---|
--DomainController | Set the target domain controller |
--Domain | Set the target domain |
--Force | Overwrite existing files if required |
Example Output
Example 1
If we have GenericWrite privileges on the SECURITY-POL-VN GPO, SharpGPOAbuse or PowerView can be used to abuse these privileges and create a malicious scheduled task.
References
https://github.com/FSecureLABS/SharpGPOAbuse/blob/master/README.md