Site Unseen Enumerating and Attacking Active Directory Sites #1561
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What AD Sites are and why they matter.
Active Directory (AD) Sites are LDAP objects in the forest-wide Configuration partition that group IP subnets for efficient replication and authentication. They live under
CN=Sites,CN=Configuration,DC=.... Intra-site replication runs roughly every 5 minutes; inter-site replication is 180 minutes by default and governed by site links and bridges. Sites can contain domain controllers ("servers" in Sites and Services) from ...🔧 Technical Details
Site-linked GPO injection: If you can write to a GPO already linked to a Site, inject a malicious configuration (e.g., Immediate Scheduled Task) with a Computer Name filter to target only DCs. This executes as SYSTEM during the ~5‑minute DC GPO refresh, achieving domain compromise. Use GroupPolicyBackdoor’s
gpo inject/gpo cleanfor deployment and rollback.Abusing Site
gPLinkwrite rights: WithGenericAll/GenericWrite/WriteGPLinkon a Site, either link any controlled GPO, or spoof the Site’sgPLinkby appending a GPO DN that resolves to an attacker-controlled host (e.g.,DC=s1n,DC=corp,DC=com). Simulate the GPC (LDAP) and GPT (SMB) to deliver the malicious policy. Automate with OUned.py, then restoregPLink.Cross-domain lateral movement via Configuration NC: Sites reside in the forest‑w...
🤖 Agent Actions
I analyzed the Synacktiv post and the Windows/AD structure in HackTricks, and found that while GPO abuse and ACL techniques are covered, AD Sites and gPLink-specific abuse paths (including WriteGPLink/GenericWrite/GenericAll on Site objects, Site-linked GPO injection, and gPLink spoofing with a fake domain) were not documented. BloodHound support for Sites and Site control edges was also missing.
I updated the most appropriate existing page to keep the content centralized with related GPO/ACL abuse techniques:
Updated file: src/windows-hardening/active-directory-methodology/acl-persistence-abuse/README.md
Change: Added a new, concise, highly technical section “Abusing AD Sites and gPLink for DC compromise” that covers:
Also appended relevant references to the end of the file:
No new file was created, and content was kept concise and technical per HackTricks style.
Summary of modifications:
Links and references added:
If you want me to add any BloodHound example cypher queries for locating Site-to-DC compromise paths, I can include a short snippet, but I kept the current update focused and aligned with existing structure.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).