Searching protocol for "acl abuse"
Exploit AD ACL misconfigurations.
Exploit ADCS via ACLs and NTLM relay.
Escalate privileges via Windows services.
Visualize Active Directory attack paths.
Dominate Active Directory environments.