Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ACLight.ps1 - False Positive? #4

Open
ParadoX-SobriuS opened this issue Feb 20, 2019 · 6 comments
Open

ACLight.ps1 - False Positive? #4

ParadoX-SobriuS opened this issue Feb 20, 2019 · 6 comments

Comments

@ParadoX-SobriuS
Copy link

Thank you for a great tool!

In the ACLight.ps1 file on row 3290 in the filter set we have the following:
($_.ObjectType -eq "DS-Replication-Get-Changes")
If I've read the code correctly, this is a part of the result that will be presented in the zBang GUI showing the DCSync Arrow.
From all the documentation that I've read and research done, I don't see that this ACL Permission gives the DCSync ability. Please correct me if I am wrong on this and if possible, something that I can show as proof (if documented).
Currently, it gives a false positive if my assumption is correct and could possibly lead to other users assuming their Environment not secured while in fact it is secured.

Thank you in advance

@ParadoX-SobriuS ParadoX-SobriuS changed the title ACLight.ps1 ACLight.ps1 - False Positive? Feb 20, 2019
@Hechtov
Copy link
Collaborator

Hechtov commented Feb 20, 2019

Hi @ParadoX-SobriuS
For performing DCSync attack you indeed need DS-Replication-Get-Changes permission over the target domin object.
Here are lots of references that talk about DCSync and the replication permissions from the DCs:
https://adsecurity.org/?p=1729 -> read the "Delegating Rights to Pull Account data"
https://adsecurity.org/wp-content/uploads/2016/03/DerbyCon-2015-Metcalf-RedvsBlue-ADAttackAndDefense-Presented-Final.pdf -> slide 60
http:https://www.harmj0y.net/blog/redteaming/abusing-active-directory-permissions-with-powerview/
https://blog.stealthbits.com/extracting-user-password-data-with-mimikatz-dcsync/
https://blog.fox-it.com/2018/04/26/escalating-privileges-with-acls-in-active-directory/
Etc.

@Hechtov Hechtov closed this as completed Feb 20, 2019
@ParadoX-SobriuS
Copy link
Author

ParadoX-SobriuS commented Feb 20, 2019 via email

@Hechtov
Copy link
Collaborator

Hechtov commented Feb 20, 2019

Ok might be, but I think it's still important thing to discover all the accounts with "DS-Replication-Get-Changes" permissions over the root object of the domain, also if they don't have the option of "All" and "Filtered"

@ParadoX-SobriuS
Copy link
Author

I agree that we should fetch the "DS-Replication-Get-Changes" and have this highlighted as a wrong move on that could easily become a catastrophy.
But for the zBang tool, it currectly is a false positive and this is why I reported it as an issue.
There should be a change in the way that the presentation of 'DCSync' is done so that if only "DS-Replication-Get-Changes" is present, it is not a DCSync issue, but rather something like 'DS Replication' and should be considered a Tier1 Account/group

@Hechtov
Copy link
Collaborator

Hechtov commented Feb 21, 2019

Yes, so I reopened this as a small issue and we will take a look at this. The fix is quite easy, and will be considered to a future version. Thanks @ParadoX-SobriuS

@Hechtov Hechtov reopened this Feb 21, 2019
@ParadoX-SobriuS
Copy link
Author

Great and Thanks for an awesome Product!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

2 participants