Return to the home page
Article Describes Exploiting Excessive Permissions in Active Directory

Article Describes Exploiting Excessive Permissions in Active Directory

HackingACLActiveDirectoryDCSyncFTPHackTheBoxEditor'sChoiceArticles

The article describes a method of exploiting a chain of excessive permissions in Active Directory. The attack begins with taking control of an FTP server, followed by extracting a user's credentials from a password manager. Then, another chain of excessive permissions is exploited to execute DCSync and take control of the entire domain.