Site Unseen Enumerating and Attacking Active Directory Sites #1557
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What AD Sites are and why they matter
Active Directory (AD) Sites group highly connected subnets to optimize replication and authentication. Intra‑site replication runs every ~5 minutes; inter‑site replication occurs over site links (compressed; 180 minutes by default). Site links are transitive by default via site bridges. Sites, subnets, and site links are LDAP objects in the forest‑wide Configuration NC:
CN=Sites,CN=Configuration,DC=corp,DC=com. Sites can have Group Po...🔧 Technical Details
Poison a site‑linked GPO to run code as SYSTEM on DCs: If a GPO is already linked to a Site and you can write to it, inject a payload (e.g., an immediate Scheduled Task) targeting only DCs via a Computer Name filter. Update
gPCMachineExtensionNamesand bump GPO versions so clients apply it. On next refresh (~5 min), DCs execute your task and grant admin/RCE.Abuse Site ACLs to change gPLink: With
GenericAll/GenericWrite/WriteGPLinkon a Site, either link a GPO you control or spoofgPLinkto a GPO path under an attacker‑controlled DNS name. Serve a valid GPC (LDAP) and GPT (SMB) so clients/DCs apply your malicious GPO. OUned.py automates cloning, payload injection (GPB module),gPCFileSysPathrewrite, extension names update, version bump, and cleanup.Forest‑wide lateral movement via Configuration NC: Because Sites live in the writable forest‑replicated Configuration partiti...
🤖 Agent Actions
I analyzed the Synacktiv blog on abusing Active Directory Sites and implemented the relevant techniques into HackTricks.
What I did
Summary of added content
References updated
Files modified
Notes
If you want me to add a small cross-link snippet in the BloodHound page pointing back to this new section, I can do that in a follow-up change.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).