In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the WriteDacl permission in Active Directory environments. Attackers can abuse
First seen on hackingarticles.in
Jump to article: www.hackingarticles.in/abusing-ad-dacl-writedacl/