Documentation Index
Fetch the complete documentation index at: https://bloodhound.specterops.io/llms.txt
Use this file to discover all available pages before exploring further.
Abuse Info
Control over the GPO can be abused to compromise the AD accounts the GPO applies to by modifying the GPO policy settings. Refer to A Red Teamer’s Guide to GPOs and OUs for details about the abuse technique, and check out the following tools for practical exploitation:- Windows: SharpGPOAbuse
- Linux: pyGPOAbuse
Opsec Considerations
There is no opsec information for this edge.Edge Schema
Source: GPODestination: Domain, OU
Traversable: Yes