Skip to content

Latest commit

 

History

History
126 lines (65 loc) · 3.23 KB

T1069.md

File metadata and controls

126 lines (65 loc) · 3.23 KB

T1069 - Permission Groups Discovery

Adversaries may attempt to find local system or domain-level groups and permissions settings.

Windows

Examples of commands that can list groups are net group /domain and net localgroup using the Net utility.

Mac

On Mac, this same thing can be accomplished with the dscacheutil -q group for the domain, or dscl . -list /Groups for local groups.

Linux

On Linux, local groups can be enumerated with the groups command and domain groups via the ldapsearch command.

Office 365 and Azure AD

With authenticated access there are several tools that can be used to find permissions groups. The Get-MsolRole PowerShell cmdlet can be used to obtain roles and permissions groups for Exchange and Office 365 accounts.(Citation: Microsoft msrole)(Citation: GitHub Raindance)

Azure CLI (AZ CLI) also provides an interface to obtain permissions groups with authenticated access to a domain. The command az ad user get-member-groups will list groups associated to a user account.(Citation: Microsoft AZ CLI)(Citation: Black Hills Red Teaming MS AD Azure, 2018)

Atomic Tests


Atomic Test #1 - Permission Groups Discovery

Permission Groups Discovery

Supported Platforms: macOS, Linux

Attack Commands: Run with sh!

dscacheutil -q group
dscl . -list /Groups
groups


Atomic Test #2 - Basic Permission Groups Discovery Windows

Basic Permission Groups Discovery for Windows

Supported Platforms: Windows

Attack Commands: Run with command_prompt!

net localgroup
net group /domain
net group "domain admins" /domain


Atomic Test #3 - Permission Groups Discovery PowerShell

Permission Groups Discovery utilizing PowerShell

Supported Platforms: Windows

Inputs:

Name Description Type Default Value
user User to identify what groups a user is a member of string administrator

Attack Commands: Run with powershell!

get-localgroup
get-ADPrincipalGroupMembership #{user} | select name


Atomic Test #4 - Elevated group enumeration using net group

Runs "net group" command including command aliases and loose typing to simulate enumeration/discovery of high value domain groups

Supported Platforms: Windows

Attack Commands: Run with command_prompt!

net group /domai "Domain Admins"
net groups "Account Operators" /doma
net groups "Exchange Organization Management" /doma
net group "BUILTIN\Backup Operators" /doma