Select Page

Test Page

The Attack of the Trojan GPOs

The story of the Trojan Horse is well known to everyone who has taken a history class. True or not, the story goes that the Greeks, in an effort to

Understanding Group Policy Privilege Escalation in CVE-2020-1317

Earlier this month, Microsoft released an advisory for CVE-2020-1317 which describes a privilege escalation vulnerability in Group Policy. This was further detailed by the discoverer of the vulnerability on the

The GPOGUY Group Policy FAQ

Quirks in Restricted Groups Policy on AD Groups

About a year ago, I posted about the perils of granting someone write access on the Active Directory Domain NC "head" object, and how you could use that and some

Understanding the Registry Policy Archive File

One of the advantages of messing around with Group Policy since before it shipped, is that there is a lot of stuff rattling around in my head that I've been

Hijacking Administrative Templates

As I think about Group Policy as a target for attackers, there are many obvious avenues to take advantage of a poorly protected GP infrastructure. I've written about many of

What Does Group Policy Do When It Can’t Contact a DC?

The title of this blog tells it all. I got asked the question--what happens to GP processing when a client machine isn't on the network and can't connect to it's

Sending GPOs Down the Wrong Track–Redirecting the GPT

At this blog title implies, this is a bit of a science experiment. Many years ago I played around with this idea that, there is nothing in the GP infrastructure