Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
DACL Attacks

Abusing AD-DACL: AddSelf

January 8, 2025March 16, 2026 by raj10 Min Reading

This post explores AddSelf Active Directory abuse, a common misconfiguration involving Discretionary Access Control Lists (DACL). Specifically, by exploiting the AddSelf permission, attackers can escalate

Red Teaming

Active Directory Pentesting Using Netexec Tool

December 28, 2024 by raj10 Min Reading

Active Directory (AD) penetration testing is an essential part of the security assessment of enterprise networks. Moreover, the Netexec tool offers a wide range of

DACL Attacks

Abusing AD-DACL: WriteOwner

December 11, 2024 by raj11 Min Reading

In this post, we delve into WriteOwner Active Directory abuse, a powerful technique that allows attackers to change the ownership of directory objects. Specifically, by

DACL Attacks

Abusing AD-DACL: WriteDacl

December 5, 2024 by raj9 Min Reading

In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the WriteDacl permission in Active Directory environments. Specifically, attackers can

DACL Attacks

Abusing AD-DACL: GenericWrite

November 27, 2024 by raj6 Min Reading

In this post, we explore GenericWrite Active Directory abuse, focusing on how attackers exploit Discretionary Access Control Lists (DACLs) to escalate privileges. By abusing the

DACL Attacks

Abusing AD-DACL: AllExtendedRights

November 14, 2024 by raj5 Min Reading

AllExtendedRights Active Directory abuse represents a critical threat vector, as attackers can exploit Discretionary Access Control Lists (DACL) in enterprise environments. In this post, we

DACL Attacks

Abusing AD-DACL: ForceChangePassword

November 14, 2024 by raj6 Min Reading

In this post, we explore ForceChangePassword Active Directory abuse via the exploitation of Discretionary Access Control Lists (DACL) using the ForcePasswordChange permission in Active Directory

DACL Attacks

Abusing AD-DACL : Generic ALL Permissions

October 17, 2024 by raj12 Min Reading

In this post, we explore how attackers can exploit the Generic ALL Active Directory abuse through Discretionary Access Control Lists (DACL). This powerful permission grants

OSINT

OSINT: User Privacy in Linux

September 24, 2024 by raj10 Min Reading

Linux telemetry, which involves gathering and sending data from a Linux-based system to an external server or service, raises concerns about Linux telemetry and privacy.

Posts pagination

Previous 1 … 8 9 10 … 156 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.