GPP attacks
Last updated
Last updated
Group Policy Preferences (GPP) are a powerful tool that once allowed administrators to create domain policies with embedded credentials. These policies allowed administrators to set local accounts, embed credentials for the purposes of mapping drives, or perform other tasks that may otherwise require an embedded password in a script.
While a useful tool, the storage mechanism for the credentials was flawed and allowed attackers to trivially decrypt the plaintext credentials. While addressed in MS14-025, this patch only prevents new policies from being created, and any legacy GPPs containing credentials must be found and removed.
Often, these kinds of policies can involve service accounts that frequently have elevated privileges. And one of these methods to find those credz is mining SYSVOL for credential data.
SYSVOL is the domain-wide share in Active Directory to which all authenticated users have read access. SYSVOL contains logon scripts, group policy data, and other domain-wide data which needs to be available anywhere there is a Domain Controller (since SYSVOL is automatically synchronized and shared among all Domain Controllers).
All domain Group Policies are stored here: \\<DOMAIN>\SYSVOL\<DOMAIN>\Policies\
Now off to the hack, you can use a module called smb_enum_gpp in metasploit to find the group.xml file
the output should look something like this :
Even without Metasploit, one can extract the cpassword value from the files on SYSVOL and pass them to the gpp-decrypt; so for example you can use :
cracking with gpp-decrypt :
For more information :