Add interesting_perms module for advanced LDAP ACL enumeration#1196
Closed
TurkiNeptune wants to merge 1 commit intoPennyw0rth:mainfrom
Closed
Add interesting_perms module for advanced LDAP ACL enumeration#1196TurkiNeptune wants to merge 1 commit intoPennyw0rth:mainfrom
TurkiNeptune wants to merge 1 commit intoPennyw0rth:mainfrom
Conversation
Contributor
|
Thanks for the PR! But this is unfortunately duplicate #1176 |
Author
|
np have a good rest of your day |
Member
|
Closing then |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
Added a new LDAP module
interesting_permsdesigned to audit Active Directory for abusable permissions and extended rights natively.Standard LDAP enumeration can be noisy and often misses inherited rights. This module solves that by:
tokenGroupsvia a BASE scope query to unroll nested groups, allowing operators to see their true effective inherited permissions across the domain.-o self=1) to instantly view explicit outbound permissions for a newly compromised account.AI Assistance Statement:
This PR was created with the assistance of AI in refining side features.
Type of change
Insert an "x" inside the brackets for relevant items (do not delete options)
Setup guide for the review
Testing Environment:
Testing the Feature:
No special GPO changes, registry settings, or additional software are required. Standard AD LDAP access with a valid domain user is sufficient.
Basic Execution (Filters out built-in noise):
nxc ldap <IP> -u <USER> -p <PASS> -M interesting_permsTesting Explicit Self-Permissions:
Create an explicit ACE for your testing user over another object, then run:
nxc ldap <IP> -u <USER> -p <PASS> -M interesting_perms -o self=1Testing Effective Nested Permissions (
tokengroup=1):Ensure your testing user is in a group that has privileges over other objects.
nxc ldap <IP> -u <USER> -p <PASS> -M interesting_perms -o tokengroup=1Expected Result: The module will print
[*] Unrolled X inherited SIDs...and display the inherited rights.Checklist:
Insert an "x" inside the brackets for completed and relevant items (do not delete options)
poetry run ruff check ., use--fixto automatically fix what it can)tests/e2e_commands.txtfile if necessary (new modules or features are required to be added to the e2e tests)