Skip to main content

List vulnerable ACL.

Project description

A python script to automatically list vulnerable Windows ACEs/ACLs.
PyPI GitHub release (latest by date)

Installation

You can install it from pypi (latest version is PyPI) with this command:

sudo python3 -m pip install abuseACL

OR from source :

git clone https://github.com/AetherBlack/abuseACL
cd abuseACL
sudo python3 -m pip install -r requirements.txt
sudo python3 setup.py install

OR with pipx :

python3 -m pipx install git+https://github.com/AetherBlack/abuseACL/

Examples

  • You want to list vulnerable ACEs/ACLs for the current user :
abuseACL $DOMAIN/$USER:"$PASSWORD"@$TARGET

  • You want to list vulnerable ACEs/ACLs for another user/computer/group :
abuseACL -principal Aether $DOMAIN/$USER:"$PASSWORD"@$TARGET

  • You want to list vulnerable ACEs/ACLs for a list of users/computers/groups :
abuseACL -principalsfile accounts.txt $DOMAIN/$USER:"$PASSWORD"@$TARGET

Here is an example of principalsfile content:

Administrateur
Group
aether
Machine$

  • You want to list vulnerable ACEs/ACLs on Schema or on adminSDHolder :
abuseACL -extends $DOMAIN/$USER:"$PASSWORD"@$TARGET

You can look in the documentation of DACL to find out how to exploit the rights and use dacledit to exploit the ACEs.

How it works

The tool will connect to the DC's LDAP to list users/groups/computers/OU/certificate templates and their nTSecurityDescriptor, which will be parsed to check for vulnerable rights.


Credits

License

GNU General Public License v3.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

abuseacl-2.0.1.tar.gz (28.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

abuseacl-2.0.1-py3-none-any.whl (34.9 kB view details)

Uploaded Python 3

File details

Details for the file abuseacl-2.0.1.tar.gz.

File metadata

  • Download URL: abuseacl-2.0.1.tar.gz
  • Upload date:
  • Size: 28.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for abuseacl-2.0.1.tar.gz
Algorithm Hash digest
SHA256 8ca9432fe70a44983250ca37b5d184deb412bd247f1a8152df3a19a1d90f41a6
MD5 9e622fe1054149dc0b44c82efc7d3e64
BLAKE2b-256 ad121ff0f34746e2f20acb91bb53648999023d221fccc772c4bf0895e212d76d

See more details on using hashes here.

File details

Details for the file abuseacl-2.0.1-py3-none-any.whl.

File metadata

  • Download URL: abuseacl-2.0.1-py3-none-any.whl
  • Upload date:
  • Size: 34.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for abuseacl-2.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 acb94807f3059b695b5ced42fea59bbc3b467134230651897c32e3d9ae35a835
MD5 ed23f475c3bef17b4bce76f479af4174
BLAKE2b-256 788e9a6a17aeb55ecc961c17803f5b1b8019d02bd1406f4df05e8e7497790419

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page