Abuse ACLS
Methods
ACLs enumeration
#Powershell CMDLets (Manul Mode and evasive)
PS C:\\htb> Get-ADUser -Filter * | Select-Object -ExpandProperty SamAccountName > ad_users.txt
PS C:\\htb> foreach($line in [System.IO.File]::ReadLines("C:\\Users\\htb-student\\Desktop\\ad_users.txt")) {get-acl "AD:\\$(Get-ADUser $line)" | Select-Object Path -ExpandProperty Access | Where-Object {$_.IdentityReference -match 'INLANEFREIGHT\\\\wley'}}
#Performing a Reverse Search & Mapping to a GUID Value
PS C:\\htb> $guid= "00299570-246d-11d0-a768-00aa006e0529"
PS C:\\htb> Get-ADObject -SearchBase "CN=Extended-Rights,$((Get-ADRootDSE).ConfigurationNamingContext)" -Filter {ObjectClass -like 'ControlAccessRight'} -Properties * |Select Name,DisplayName,DistinguishedName,rightsGuid| ?{$_.rightsGuid -eq $guid} | flEnumerate ACLs for specific User
Abuse Foreign Groups
Enumerate Foreign Users
Find Foreign ACLs across all users within the domain
Abusing Foreign Security Principals & ACLs
Convert SID to name and vice versa
Need Credentials?
GenericAll Rights on User
GenericAll Rights on Group
GenericWrite on Computer
GenericWrite on User
WriteOwner Rights on User
WriteDACL Rights on Group
ForceChangePassword on User
[DCSync] DS-Replication-Get-Changes and DS-Replication-Get-Changes-All on Domain Controler
ReadGMSAPassword
Refereces
Last updated