Invoke-ACLPwn: automates the discovery and pwnage of ACLs in Active Directory
Invoke-ACLpwn
Invoke-ACLpwn is a tool that automates the discovery and pwnage of ACLs in Active Directory that is unsafely configured.
For background information, read the release blog.
Invoke-ACLpwn is designed to run with integrated credentials as well as with specified network credentials. The script works by creating an export of all ACLs in the domain with SharpHound as well as the group membership of the user account that the tool is running under. If the user does not already have writeDACL permissions on the domain object, the tool will enumerate all ACEs of the ACL of the domain. Every identity in an ACE has an ACL of its own, which is added to the enumeration queue. If an identity is a group and the group has members, every group member is added to the enumeration queue as well.
It may take some time to calculate and parse every ACL but could end up with a “chain” that leads to domain administrative privileges in the target domain.
Installation
Requirement
- .NET 3.5 or later
- sharphound.exe
- If you want to run DCsync, you need mimikatz.exe as well.
Clone the repo
git clone https://github.com/fox-it/Invoke-ACLPwn.git
Usage
Please note that specifying the mimikatz location is required unless the -NoDCSync switch is specified.
Example usage:
About restoring ACLs and groupmemberships
If the -NoSecCleanup switch is not specified, the script will remove any permission that was set by the script as well as group memberships.
Copyright (c) 2018 Fox-IT
Source: https://github.com/fox-it/