Suivre

As Windows doesn't verify that the SIDs exist on the domain when an ACL is created it's possible to insert a non-existent SID into any object's ACL we have privileges over. The main exploitation vector here is persistence. Threat actors with domain control can add permissions and privileges to future SIDs and regain a foothold by creating a user or computer account.

varonis.com/blog/synthetic-sid

Inscrivez-vous pour prendre part à la conversation
nanao

Comme le soleil, les machines ne se couchent jamais.