<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>ACL Abuse on LEIKAH</title><link>https://leikah.haoyingcao.xyz/en/tags/acl-abuse/</link><description>Recent content in ACL Abuse on LEIKAH</description><generator>Hugo</generator><language>en</language><atom:link href="https://leikah.haoyingcao.xyz/en/tags/acl-abuse/index.xml" rel="self" type="application/rss+xml"/><item><title>Abuse ACL access over groups</title><link>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/acl_abuse/group/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/acl_abuse/group/</guid><description>&lt;p&gt;Member principals within a Active Directory group automatically inherits the accesses and privileges granted to that group. If the principal we control have sufficient privileges over a group (&lt;code&gt;GenericAll&lt;/code&gt;, &lt;code&gt;GenericWrite&lt;/code&gt;, &lt;code&gt;AllExtendedRights&lt;/code&gt; or &lt;code&gt;Self-Membership&lt;/code&gt;), we can add another principal (e.g. a low-priv user) to the group so the principal inherits all access rights granted to the group.&lt;/p&gt;
&lt;h2 id="linux-perspective"&gt;Linux Perspective&lt;a class="td-heading-self-link" href="#linux-perspective" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;From a Linux attacker machine, we can use bloodyAD to add a user to a group.&lt;/p&gt;</description></item><item><title>Abuse ACL Access over User</title><link>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/acl_abuse/control_over_user/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/acl_abuse/control_over_user/</guid><description>&lt;h2 id="force-change-password"&gt;Force Change Password&lt;a class="td-heading-self-link" href="#force-change-password" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The most naive method is to simply change that user&amp;rsquo;s password. With &lt;code&gt;ForceChangePassword&lt;/code&gt; access, which is included with &lt;code&gt;GenericAll&lt;/code&gt; access on a user, we should be able to change that user&amp;rsquo;s password without knowing their current password.&lt;/p&gt;
&lt;div class="alert alert-primary" role="alert"&gt;&lt;div class="h4 alert-heading" role="heading"&gt;Note&lt;/div&gt;
&lt;p&gt;Change an account&amp;rsquo;s password is considered &lt;strong&gt;destructive&lt;/strong&gt; to the environment due to the potential disruption it may cause. With the account&amp;rsquo;s password changed, Users may not be able to log in. If the account is a service account, the service can become unavailable. During real-life engagements, only use this technique if written consent from the client is obtained.&lt;/p&gt;</description></item><item><title>ACL Abuse</title><link>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/acl_abuse/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/acl_abuse/</guid><description>&lt;p&gt;Permissions in Active Directory are controlled through &lt;strong&gt;Access Control Lists (ACL)&lt;/strong&gt;. Each security principal (user, group, process) has a corresponding ACL. ACLs define both who has access to which assets or resource, and what level of access they are granted. ACLs are made up of &lt;strong&gt;Access Control Entries (ACE)&lt;/strong&gt; that explicity allow and/or deny users or groups from access.&lt;/p&gt;
&lt;p&gt;If misconfigured, ACLs can be leveraged by attackers to achieve lateral movement or privilege escalation inside the domain. The abuse of ACL access rights are dependent on the specific access granted to the attacking user.&lt;/p&gt;</description></item><item><title>Group Managed Service Account</title><link>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/acl_abuse/gmsa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/acl_abuse/gmsa/</guid><description>&lt;p&gt;The need to protect service accounts against attacks such as Kerberoasting gave rise to &lt;strong&gt;Managed Service Accounts (MSA)&lt;/strong&gt; and later &lt;strong&gt;Group Managed Service Accounts (gMSA)&lt;/strong&gt;. While both supports automatic password generation and rotation, the latter allows the same service accounts to be used acrossed different machines.&lt;/p&gt;
&lt;p&gt;Members of the group that manage the gMSA are intended to be the machine accounts of the computers where the service account will be deployed on. Members have the ability to read the password hash of the service account (&lt;code&gt;ReadGMSAPassword&lt;/code&gt;).&lt;/p&gt;</description></item></channel></rss>