acl-abuse

Official

Exploit AD ACL misconfigurations.

Authorblacklanternsecurity
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps penetration testers identify and exploit misconfigured Access Control Lists (ACLs) in Active Directory environments to gain elevated privileges.

Core Features & Use Cases

  • ACL Enumeration: Discover objects (users, groups, computers) where you have exploitable write permissions.
  • Privilege Escalation Techniques: Execute various methods like Shadow Credentials, SPN manipulation, WriteDACL, WriteOwner, and AdminSDHolder persistence.
  • Use Case: After identifying that you have GenericAll rights on a user object via BloodHound, use this Skill to deploy Shadow Credentials, obtain a Kerberos ticket, and gain administrative access to a target system.

Quick Start

Use the acl-abuse skill to find all user objects you have write access to.

Dependency Matrix

Required Modules

bloodyADImpacketpywhiskerCertipydacledit.pyWhisker.exePowerView

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: acl-abuse
Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#acl-abuse

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.