Learning Objetive 2

Enumerate ACLs for the Domain Admins Group
Remember to conitnue using the PowerShell session started using Invisi-Shell
Excesive Permissions on us account
Finally, to check for modify rights/permissions for the studentx, we can use Find-InterestingDomainACL from PowerView:
Nothing interesting!
Member of the RDPUsers group
Since studentx is a member of the RDPUsers group, let us check permissions for it too.
Note that the output in your lab for the below command will be different and will depend on your lab instance:
Analyze the permissions for studentx using BloodHound UI
Note that it is easier to analyze ACLs using BloodHound as it shows interesting ACLs for the user and the groups it is a member of. Let's look at the 'Outbound Object Control' for the studentx in the BloodHound CE UI:

Multiple permissions stand out in the above diagram. Due to the membership of the RDPUsers group, the studentx user has following interesting permissions
Full Control/Generic All over supportx and controlx users.
Enrollment permissions on multiple certificate templates.
Full Control/Generic All on the Applocked Group Policy.

Last updated