DAMP: Persistence Through Host-based Security Descriptor Modification
The Discretionary ACL Modification Project (DAMP): Persistence Through Host-based Security Descriptor Modification.
This project contains several files that implement host-based security descriptor “backdoors” that facilitate the abuse of various remotely accessible services for arbitrary trustees/security principals.
this grants users/groups (local, domain, or ‘well-known’ like ‘Everyone’) of an attacker’s choosing the ability to perform specific administrative actions on a modified host without needing membership in the local administrator’s group.
Note: to implement these backdoors, you need the right to change the security descriptor information for the targeted service, which in stock configurations nearly always means membership in the local administrator’s group.
Implements a new remote registry backdoor that allows for the remote retrieval of a system’s machine and local account hashes, as well as its domain cached credentials.
Abuses the ACL backdoor set by Add-RemoteRegBackdoor to remotely retrieve the local machine account hash for the specified machine.
Abuses the ACL backdoor set by Add-RemoteRegBackdoor to remotely retrieve the local SAM account hashes for the specified machine.
Abuses the ACL backdoor set by Add-RemoteRegBackdoor to remotely retrieve the domain cached credentials for the specified machine.
git clone https://github.com/HarmJ0y/DAMP
- An ACE in the Hole – Stealthy Host Persistence via Security Descriptors
- The Unintended Risks of Trusting Active Directory
Copyright (c) 2018, Will
All rights reserved.