Tag: DACL Abuse

DACL Attacks

Abusing AD-DACL: AddSelf

This post explores AddSelf Active Directory abuse, a common misconfiguration involving Discretionary Access Control Lists (DACL). Specifically, by exploiting the AddSelf permission, attackers can escalate

DACL Attacks

Abusing AD-DACL: WriteOwner

In this post, we delve into WriteOwner Active Directory abuse, a powerful technique that allows attackers to change the ownership of directory objects. Specifically, by

DACL Attacks

Abusing AD-DACL: WriteDacl

In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the WriteDacl permission in Active Directory environments. Specifically, attackers can

DACL Attacks

Abusing AD-DACL: GenericWrite

In this post, we explore GenericWrite Active Directory abuse, focusing on how attackers exploit Discretionary Access Control Lists (DACLs) to escalate privileges. By abusing the

DACL Attacks

Abusing AD-DACL: AllExtendedRights

AllExtendedRights Active Directory abuse represents a critical threat vector, as attackers can exploit Discretionary Access Control Lists (DACL) in enterprise environments. In this post, we

DACL Attacks

Abusing AD-DACL: ForceChangePassword

In this post, we explore ForceChangePassword Active Directory abuse via the exploitation of Discretionary Access Control Lists (DACL) using the ForcePasswordChange permission in Active Directory

CTF Challenges

Reel HackTheBox Walkthrough

We consider Reel a Windows Active Directory machine and a hard box on HTB. This Reel HackTheBox Walkthrough showcases its uniqueness, featuring a phishing scenario