AdminSDHolder

The following security accounts and groups are protected in Active Directory Domain Services:

  • Account Operators

  • Administrator

  • Administrators

  • Backup Operators

  • Domain Admins

  • Domain Controllers

  • Enterprise Admins

  • Krbtgt

  • Print Operators

  • Read-only Domain Controllers

  • Replicator

  • Schema Admins

  • Server Operators

AdminSDHolder

Admin Security Descriptor Holder is an ACL. The purpose of the AdminSDHolder object is to provide "template" permissions for the protected accounts and groups in the domain. Every 60min, the SDProp (Security Descriptor Propagator) runs on each DC, reads the ACLs and overwrites the ACL of all protected groups.

However, if an attacker modifies the ACL for AdminSDHolder, then those modified access permissions will automatically be applied to all protected objects instead. For example, an adversary might add a user account they control to the AdminSDHolder ACL and give it full control permissions:

  • With DA privileges (Full Control/Write permissions) on the AdminSDHolder object, it can be used as a backdoor/persistence mechanism by adding a user with Full Permissions (or other interesting permissions) to the AdminSDHolder object.

    • In 60 minutes (when SDPROP runs), the user will be added with Full Control to the AC of groups like Domain Admins without actually being a member of it.

  • Other interesting permissions (ResetPassword, WriteMembers) for a user to the AdminSDHolder,:

  • Run SDProp manually using Invoke-SDPropagator.ps1 from Tools directory to make any of the above command take effect:

  • For pre-Server 2008 machines:

More Examples - :

  • Check the Domain Admins permission - PowerView as normal user:

  • Using ActiveDirectory Module:

  • Abusing Full-control using PowerView:

  • Using ActiveDirectory Module:

  • Abusing ResetPassword using PowerView:

  • Using ActiveDirectory Module:

  • Add Full Control rights, Powerview:

  • Using ActiveDirectory Module and RACE:

  • Add rights for DCSync:

  • Using ActiveDirectory Module and RACE:

Execute DCSync:

or

Last updated