Skip to content

Commit b9cb3f4

Browse files
committed
fix
1 parent b81e35d commit b9cb3f4

File tree

1 file changed

+1
-1
lines changed
  • src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem

1 file changed

+1
-1
lines changed

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-cloud-sync.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ https://book.hacktricks.wiki/en/windows-hardening/active-directory-methodology/i
8888
> Note that There isn't any way to give Azure or EntraID roles to synced users based on its attributes for example in the Cloud Sync configurations. However, in order to automatically grant permissions to synced users some **Entra ID groups from AD** might be given permissions so the synced users inside those groups also receive them or **dynamic groups might be used**, so always check for dynamic rules and potential ways to abuse them:
8989
9090
{{#ref}}
91-
../../az-privilege-escalation/az-entraid-privesc/dynamic-groups.md
91+
../az-privilege-escalation/az-entraid-privesc/dynamic-groups.md
9292
{{#endref}}
9393

9494
Regarding persistence [this blog post](https://tierzerosecurity.co.nz/2024/05/21/ms-entra-connect-sync-mothods.html) suggest that it's possible to use [**dnSpy**](https://github.com/dnSpy/dnSpy) to backdoor the dll **`Microsoft.Online.Passwordsynchronisation.dll`** located in **`C:\Program Files\Microsoft Azure AD Sync\Bin`** that is used by the Cloud Sync agent to perform the password synchronization making it exfiltrate the password hashes of the users being synchronized to a remote server. The hashes are generated inside the class **`PasswordHashGenerator`** and the blog post suggest adding some code so the class looks like (note the `use System.Net` and the `WebClient` usage to exfiltrate the password hashes):

0 commit comments

Comments
 (0)