SYSVOL and GPP
SYSVOL and GPP MS14-025
Search for the .xml file
DNS Configuration
$dnsip= "DC_IP"$index = Get-NetAdapter -Name 'ETHERNET' | Select-Object -ExpandProperty 'ifIndex' Set-DnsClientServerAddress -InterfaceIndex $index -serverAddresses $dnsipnslookup DOMAINdir \\\\DOMAIN\SYSVOL\Passwords in SYSVOL & Group Policy Preferences (GPP)
Find password in SYSVOL (MS14-025). SYSVOL is the domain-wide share in Active Directory to which all authenticated users have read access. All domain Group Policies are stored here: \DOMAIN\SYSVOL\DOMAIN\Policies\ .
Group Policy Preferences (GPP) allowed admins to create policies using embedded credentials
These credentials were encrypted and placed in a "cPassword"
They key was accidentally released
Patched in MS14-025, but it doesn't prevent previous uses
GPP is an .xml file stored in SYSVOL directory
Alternate Method
Decrypt a Group Policy Password found in SYSVOL (by 0x00C651E0), using the 32-byte AES key provided by Microsoft in the MSDN - 2.2.1.1.4 Password Encryption
Automate the SYSCOL and passwords search
1) Metasploit modules to enumerate shares and credentials
2) CrackMapExec
3) Get-GPPPassword
with a NULL session
with cleartext credentials
pass-the-hash
MITIGATIONS
Last updated