ACLs Abuse
Generic All on User
If we have generic all right over a user object we can...
Change that user's password.
net user <username> <password> /domain
Setup Targeted Kerberoasting by making that user kerberoastable by setting SPN on the account, kerberoasting it and cracking it offline
First Set SPN on that user object
Then Get Hash and crack
Setup Targeted Asreproasting by disabling pre authentication on that user asreproasting it and cracking it offline
Generic All on Group
If we have generic all rights on a group example Domain Admins we can...
Add ourselves to that group
Generic write / Write on computer
If we have generic write or write property on a domain computer we can setup Resource Based Constrained Delegation and access the computer object. See Resource-Based-Constrained-Delegation.md section.
WriteProperty on Group
If our controlled user has WriteProperty right on All objects for Domain Admin group, We can again add ourselves to the Domain Admins group and escalate privileges:
Self-Membership on group
If our user has Self-Membership property on a group we can add ourselves to that group
WriteProperty on group
If our user has WriteProperty property on a group we can add ourselves to that group
ForceChangePassword on user
If we have ExtendedRight on User-Force-Change-Password object type, we can reset the user's password without knowing their current password:
Using PowerView
Another method
WriteOwner on Group
IF user in our control has WriteOwner on a group we can change the group's owner to our user, below the sid is the sid of domain admins group
GenericWrite on Group
This allows us to set new users (yourself for example) as members of the group
DCsync
IF we have dcsync rights we can use mimikatz to dump all hashes of user and computer objects
Last updated