GPO Abuse for Lateral Movement
Weaponizing Writable Group Policy Objects
Discover GPOs you can edit, inject a malicious scheduled task using SharpGPOAbuse, and wait for Group Policy to push your payload to every machine in the target OU.
Prerequisites:Write access to a Group Policy ObjectSharpGPOAbuse or similar toolNetwork access to domain-joined targets
1
Enumerate GPO Write Permissions with BloodHound
GPO Abuse for Lateral Movement — Step 1/4
PS C:\Tools>
Click or press Enter to skip
Step 1: Find Writable GPOs
Use BloodHound/SharpHound to enumerate ACLs on all GPO objects. We are looking for non-admin users who have write access to GPOs — this lets them modify Group Policy and push changes to target machines.
We are scanning Active Directory for Group Policies that our compromised user can edit. Group Policies are like instructions that computers follow automatically. If we can edit these instructions, we can tell target computers to run our commands.
Detection Events
5136Directory object modified (GPO)
Attack Flow
Request
Response
Attack
Data