πACL Enumeration
π Overview
π― Strategic Context
π§ ACL Fundamentals
β‘ ACL Attack Scenarios
π§ PowerView ACL Enumeration
π Basic ACL Discovery with Find-InterestingDomainAcl
π― Targeted ACL Enumeration Strategy
π Step 1: Convert Username to SID
π Step 2: Basic Object ACL Search (Without GUID Resolution)
π Step 3: Manual GUID to Rights Mapping
β‘ Step 4: Automated GUID Resolution with -ResolveGUIDs
π Alternative Native PowerShell Methods
π Method 1: Using Get-Acl and Get-ADUser
π Multi-Hop Attack Path Discovery
π Attack Chain Example: wley β damundsen β Help Desk Level 1 β Information Technology β adunn β DCSync
Step 1: Initial User (wley) Analysis
Step 2: Second Hop Analysis (damundsen)
Step 3: Group Nesting Analysis
Step 4: Information Technology Group Rights
Step 5: Final Target Analysis (adunn)
π©Έ BloodHound ACL Visualization
π Attack Path Discovery with BloodHound
Step 1: Data Collection
Step 2: Visual Analysis
Step 3: Interactive Attack Path
π BloodHound Interface Features
Right-Click Help Menus:
Pre-Built Queries:
π― HTB Academy Lab Solutions
π Lab Questions & Solutions
π Question 1: "What is the rights GUID for User-Force-Change-Password?"
π© Question 2: "What flag can we use with PowerView to show us the ObjectAceType in a human-readable format during our enumeration?"
π Question 3: "What privileges does the user damundsen have over the Help Desk Level 1 group?"
π― Question 4: "Using the skills learned in this section, enumerate the ActiveDirectoryRights that the user forend has over the user dpayne (Dagmar Payne)."
π Question 5: "What is the ObjectAceType of the first right that the forend user has over the GPO Management group? (two words in the format Word-Word)"
π HTB Academy Lab Summary
π§ Advanced ACL Enumeration Techniques
π― Targeted Rights Enumeration
π Object-Specific ACL Analysis
π ACL Statistics and Analysis
π οΈ Common ACL Attack Patterns
π Password Reset Rights
π₯ Group Membership Manipulation
π― GenericAll Exploitation
π DCSync Rights Discovery
π Key Learning Objectives
β
PowerView Mastery
π― Attack Path Discovery
π BloodHound Integration
β οΈ Operational Considerations
β‘ Quick Reference Commands
π§ Essential ACL Enumeration Workflow
π Common ACL Rights Reference
π Key Takeaways
β
ACL Enumeration Best Practices
π― Strategic Enumeration
β οΈ Operational Insights
π Attack Chain Examples
Last updated