diff --git a/src/windows-hardening/active-directory-methodology/privileged-groups-and-token-privileges.md b/src/windows-hardening/active-directory-methodology/privileged-groups-and-token-privileges.md index 0d7237d26..a41772cfd 100644 --- a/src/windows-hardening/active-directory-methodology/privileged-groups-and-token-privileges.md +++ b/src/windows-hardening/active-directory-methodology/privileged-groups-and-token-privileges.md @@ -18,7 +18,7 @@ To identify the members of this group, the following command is executed: Get-NetGroupMember -Identity "Account Operators" -Recurse ``` -Adding new users is permitted, as well as local login to DC01. +Adding new users is permitted, as well as local login to the DC. ## AdminSDHolder group @@ -164,7 +164,10 @@ To list members of the DnsAdmins group, use: Get-NetGroupMember -Identity "DnsAdmins" -Recurse ``` -### Execute arbitrary DLL +### Execute arbitrary DLL (CVE‑2021‑40469) + +> [!NOTE] +> This vulnerability allows for the execution of arbitrary code with SYSTEM privileges in the DNS service (usually inside the DCs). This issue was fixed in 2021. Members can make the DNS server load an arbitrary DLL (either locally or from a remote share) using commands such as: @@ -242,6 +245,10 @@ sc.exe start MozillaMaintenance Note: Hard link exploitation has been mitigated in recent Windows updates. +## Group Policy Creators Owners + +This group allows members to create Group Policies in the domain. However, its members can't apply group policies to users or group or edit existing GPOs. + ## Organization Management In environments where **Microsoft Exchange** is deployed, a special group known as **Organization Management** holds significant capabilities. This group is privileged to **access the mailboxes of all domain users** and maintains **full control over the 'Microsoft Exchange Security Groups'** Organizational Unit (OU). This control includes the **`Exchange Windows Permissions`** group, which can be exploited for privilege escalation.