Bibliothèque
DiscordHackTheBoxTryHackMeGitHub
  • Welcome wanderer
    • Bibliothèque
    • Hacking Philosophy
    • Useful Links
  • PENTESTING
    • Methodology
    • Protocols
      • FTP
      • SMB
      • NFS
      • SSH
      • RDP
      • SMTP
      • IMAP / POP3
      • RSYNC
      • SNMP
      • IPMI
      • R-Services
      • WinRM
      • WMI
      • LDAP
    • Databases
      • MySQL
      • MSSQL
      • Oracle TNS
      • PostgreSQL
    • File Transfers
      • Windows
      • Linux
      • Code
      • Misc
    • Password Attacks
      • John The Ripper
      • Hashcat
    • Docker
  • TOOLS
    • Nmap
    • Metasploit
    • BloodHound
    • Other
  • Linux
    • Theory
    • Commands and Utilities
      • Useful Commands
    • Bash Scripting
    • Post-Exploitation
      • Cred Hunting
      • Pivoting
  • WINDOWS
    • Theory
      • Security
    • Commands and Utilities
    • PowerShell
    • Post-Exploitation
      • Tools
      • Enumeration
        • System
        • Network
        • Users
        • Groups
        • Processes / Services
        • Permissions
        • Defence
        • Programs
        • Files
      • Access
      • Pivoting
      • Cred Hunting
    • Privilege Escalation
      • Privileges
      • Built-In Groups
        • Backup Operators
        • Server Operators
        • Print Operators
        • DnsAdmins
        • Event Log Readers
      • Privilege Abuse
        • Potatoes
        • SeDebugPrivilege
        • SeTakeOwnershipPrivilege
        • SeManageVolumePrivilege
      • MISC
        • UAC Bypass
        • User-Interaction Attacks
        • Weak Permissions
  • ACTIVE DIRECTORY
    • Theory
      • Terminology
    • Reconnaissance
      • Responder
      • Password Policies
      • DNS
      • Enumeration
        • Users
        • Groups
          • GPO's
        • Shares
        • Domain
        • Trusts
        • ACL
        • Tombstone
    • Movement
      • Credentials
        • Dumping
          • DCSync
          • DPAPI Secrets
        • Making a Target List
        • Spraying
        • Powershell Remoting
      • Kerberos
        • Kerbrute
        • Kerberoasting
          • Semi-Manual Way
          • Targeted Kerberoasting
        • ASREProasting
        • Forging
          • Golden Ticket
        • Shadow Credentials
        • Overpass The Hash
        • Pass The Ticket
        • RBCD
        • noPAC
      • MITM / Coerced Auths
        • LLMNR, NBT-NS Poisoning
        • PetitPotam
      • DACL Abuse
        • AddMember
        • ForceChangePassword
        • WriteOwner
      • Trust Abuse
        • ExtraSIDs
      • ADCS
        • ESC1
        • ESC15
        • ESC16
        • Golden Certificate
      • Printers
        • PrintNightmare
    • Tools
  • Networking
    • Theory
      • Types / Topologies
      • OSI & TCP/IP Models
      • TCP / UDP
      • MAC Addresses
      • IP / Subnetting
      • Proxies
      • ARP
    • Pivoting
      • Port-Forwarding
    • Commands and Utilities
    • Techniques
  • WEB
    • Web Recon
      • Fuzzing
    • DNS
  • CLOUD
    • Google GKE/GCP
      • Theory
Powered by GitBook
On this page
  • ABOUT
  • Zombie Objects
  • LOCATING
  • Computers
  • Users
  • Groups
  • TECHNO-NECROMANCY
  • RESOURCES
  1. ACTIVE DIRECTORY
  2. Reconnaissance
  3. Enumeration

Tombstone

ABOUT

Tombstone in Active Directory is a logically deleted object that's kept for a limited time (default: 180 days) to allow deletion to replicate across domain controllers. It retains critical attributes like objectSID, objectGUID, and lastKnownParent, enabling potential object recovery. After the tombstone lifetime, the object is permanently removed by garbage collection. Tombstones help prevent lingering objects and replication conflicts.

Zombie Objects

For better explanation you need to imagine a scenario. You have DC1 and DC2. You have same object (user) Bob on both of DC's. Replication technology is used to sync objects between these two. But DC1 is going offline. During that time, Bob is deleted, tombstone is made and replicated. Then after 180 days all tombstones are deleted. Then DC1 is getting back online, and there is not tombstone to notify DC1 that Bob was deleted. Because of that DC1 thinks that bob is valid user, and replicates it across all Domain.

LOCATING

Computers

Get-ADObject -Filter 'isDeleted -eq $true -and objectClass -eq "computer"' -IncludeDeletedObjects

Users

Get-ADObject -Filter 'isDeleted -eq $true -and objectClass -eq "user"' -IncludeDeletedObjects

Groups

Get-ADObject -Filter 'isDeleted -eq $true -and objectClass -eq "group"' -IncludeDeletedObjects

TECHNO-NECROMANCY

Restoring dead objects

Restore-ADObject -Identity '<ObjectGUID>'

RESOURCES

PreviousACLNextMovement

Last updated 14 hours ago

AD Tombstone ObjectsITPro Today
Logo