{"id":10453,"date":"2019-07-14T00:46:00","date_gmt":"2019-07-13T22:46:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=10453"},"modified":"2019-08-16T20:34:38","modified_gmt":"2019-08-16T18:34:38","slug":"active-directory-administrator-backdoor-technik","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/07\/14\/active-directory-administrator-backdoor-technik\/","title":{"rendered":"Active Directory Administrator &lsquo;Backdoor&rsquo;"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>Today a Sunday security snippet. It's about Active Directory and its administration, including the question of how someone who used to be an admin can leave behind a kind of 'backdoor', through which he could later make himself an administrator again.<\/p>\n<p><!--more--><\/p>\n<p>It is mainly an info splitter for pentesters and responsible administrators of Active Directory environments who don't know the problem yet. In short: An administrator removes his account superficially &#8211; so he doesn't belong to the circle of administrators anymore. But he does this step in such a way that he later has access to the user administration again and can upgrade himself to administrator.<\/p>\n<p>When controlling the users of the Administrators group, this would not be noticeable. So it would be something like an invisible backdoor or a Trojan for administrators &#8211; a technique that hackers can also use if they have compromised a system and need a backdoor for later that doesn't attract attention. I became aware of this topic through the following tweet by Kevin Beaumont.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">One for red teams and haxxors &#8211; great blog by @huykh4 around a new technique to backdoor Active Directory Domain Admins so you can add yourself in at any time later, even when not an admin. Trojan Domain Admin basically. <a href=\"https:\/\/t.co\/5ZgcEDXLwO\">https:\/\/t.co\/5ZgcEDXLwO<\/a><\/p>\n<p>\u2014 Kevin Beaumont (@GossiTheDog) <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1149702972319969280?ref_src=twsrc%5Etfw\">12. Juli 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The article with the explanations can be found now within the\u00a0Pentest-Magazin\u00a0<a href=\"https:\/\/pentestmag.com\/hiding-in-the-shadows-at-managedby-attribute\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Hiding in the Shadows at ''ManagedBy'' Attribute<\/a>. Perhaps it is useful for one or the other administrator from this environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today a Sunday security snippet. It's about Active Directory and its administration, including the question of how someone who used to be an admin can leave behind a kind of 'backdoor', through which he could later make himself an administrator &hellip; <a href=\"https:\/\/borncity.com\/win\/2019\/07\/14\/active-directory-administrator-backdoor-technik\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-10453","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=10453"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10453\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=10453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=10453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=10453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}