Abuse Info
Control over the GPO can be abused to compromise the AD accounts the GPO applies to by modifying the GPO policy settings. Refer to A Red Teamer’s Guide to GPOs and OUs for details about the abuse technique, and check out the following tools for practical exploitation:- Windows: SharpGPOAbuse
- Linux: pyGPOAbuse
Opsec Considerations
There is no opsec information for this edge.Edge Schema
Source: GPODestination: Domain, OU
Traversable: Yes