All Projects → GhostPack → RestrictedAdmin

GhostPack / RestrictedAdmin

Licence: BSD-3-Clause License
Remotely enables Restricted Admin Mode

Programming Languages

C#
18002 projects
YARA
70 projects

RestrictedAdmin

Quick and dirty C# program that remotely enables "Restricted Admin Mode".

Restricted Admin Mode was introduced in Windows 8.1 as an attempt to prevent credential exposure via RDP. While well intentioned, this unfortunately introduced the ability to pass-the-hash to RDP.

While Restricted Admin Mode is not enabled by default on systems, we can enable it by setting the value of DisableRestrictedAdmin to 0 at HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa. In order to do this remotely, we could use remote registry, however this is not always enabled on systems (particularly workstations). Instead, we can use the StdRegProv WMI class to flip this value remotely. This approach was later expanded by @airzero24 in his WMIReg project.

The TypeLib GUID of RestrictedAdmin is 79F11FC0-ABFF-4E1F-B07C-5D65653D8952. This is reflected in the Yara rules currently in this repo.

I did not invent or figure out any of this. For more information and references on the work this was built on, see the References section at the bottom of this README.

Usage

C:\Tools>RestrictedAdmin.exe


Usage:

        Check the DisableRestrictedAdmin value:
                RestrictedAdmin.exe <system.domain.com>


        Enabled Restricted Admin mode (set DisableRestrictedAdmin to 0):
                RestrictedAdmin.exe <system.domain.com> 0


        Disable Restricted Admin mode (set DisableRestrictedAdmin to 1):
                RestrictedAdmin.exe <system.domain.com> 1


        Clear the Restricted Admin mode setting completely:
                RestrictedAdmin.exe <system.domain.com> clear

References

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].