acl-abuse
OfficialExploit AD ACL misconfigurations.
Software Engineering#privilege escalation#pentesting#kerberos#active directory#acl abuse#ad security
Authorblacklanternsecurity
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps penetration testers identify and exploit misconfigured Access Control Lists (ACLs) in Active Directory environments to gain elevated privileges.
Core Features & Use Cases
- ACL Enumeration: Discover objects (users, groups, computers) where you have exploitable write permissions.
- Privilege Escalation Techniques: Execute various methods like Shadow Credentials, SPN manipulation, WriteDACL, WriteOwner, and AdminSDHolder persistence.
- Use Case: After identifying that you have
GenericAllrights on a user object via BloodHound, use this Skill to deploy Shadow Credentials, obtain a Kerberos ticket, and gain administrative access to a target system.
Quick Start
Use the acl-abuse skill to find all user objects you have write access to.
Dependency Matrix
Required Modules
bloodyADImpacketpywhiskerCertipydacledit.pyWhisker.exePowerView
Components
scriptsreferences
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: acl-abuse Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#acl-abuse Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.