GPP/cPassword Attacks
Overview
Background
What are Group Policy Preferences?
The cPassword Vulnerability
GPP File Structure
Common GPP Files in SYSVOL
Example Groups.xml Structure
Key Fields in GPP Files
Field
Description
Example Value
Enumeration Techniques
Method 1: Metasploit smb_enum_gpp
Method 2: Manual SYSVOL Enumeration
Method 3: PowerShell Enumeration
Method 4: Linux Command Line Tools
Manual Decryption
Using gpp-decrypt
PowerShell Decryption Script
Attack Scenarios
Scenario 1: Domain Enumeration via GPP
Scenario 2: Automated Discovery with Metasploit
Scenario 3: Service Account Discovery
Post-Exploitation
Using Discovered Credentials
Persistence and Lateral Movement
Detection and Forensics
Finding GPP Activity
SYSVOL Monitoring
Mitigation Strategies
Technical Mitigations
Administrative Controls
Network Monitoring
PJPT Exam Tips
For the PJPT Exam
Last updated