# Group Policy Preferences

Adversaries may attempt to find unsecured credentials in Group Policy Preferences(GPP). GPP are tools that allow administrators to create domain policies with embedded credentials. These policies allow administrators to set local accounts.

These group policies are stored in SYSVOL on a domain controller. This means that any domain user can view the SYSVOL share and decrypt the password (using the AES key that has been made public).

The following tools and scripts can be used to gather and decrypt the password file from Group Policy Preference XML files:

·         Metasploit's post exploitation module: post/windows/gather/credentials/gpp

·         Get-GPPPassword

·         Gppredecrypt.py

On the SYSVOL share, adversaries may use the following command to enumerate potential GPP XML files: dir /s \* .xml

References:

**This site explains it way better and has incredible demonstrations easy to follow.**

{% embed url="<https://adsecurity.org/?p=2288>" %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://dmcxblue.gitbook.io/red-team-notes-2-0/red-team-techniques/credential-access/t1552-unsecured-credentials/group-policy-preferences.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
