SID History
Last updated
Last updated
#powershell
is used to track the security principal for an account.
SID history is used to track previous SIDs of the user (maybe while migrating the AD environment to a new one). This allows the user to access resource in the previous/last domain using the new account.
SID history, by design, can story any SID, and doesn't need to be from other domain.
With domain admin privileges, we can add/modify SIDs to the SID history property of a user object.
When the user logs in, the SIDs are added to their access token, which determines the privilege of the user.
This can be exploited for persistence as we can add the SID of an enterprise admin, as this would elevate the privilege of the user, even though we are not added to the Enterprise Admin group.
SID property can fetched with AD module:
Adding SID history using DSInternals