Senshu

ACL-Abuse

Star

Active Directory ACL abuse — every BloodHound-reported right, organized by scenario (right + target object type). Each scenario groups bloodyAD (remote/Linux) and PowerView (Windows shell) commands together. PowerView: always build $Cred when the abusing user differs from your current shell identity.

Credentials

Copy References:

https://github.com/CravateRouge/bloodyAD

https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1

https://github.com/fortra/impacket

https://happycamper84.medium.com/dangerous-rights-cheatsheet-33e002660c1d