All Projects → cyberark → Aclight

cyberark / Aclight

Licence: bsd-3-clause
A script for advanced discovery of Privileged Accounts - includes Shadow Admins

Programming Languages

powershell
5483 projects

Projects that are alternatives of or similar to Aclight

adalanche
Active Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+60.82%)
Mutual labels:  active-directory, acl
Plumhound
Bloodhound for Blue and Purple Teams
Stars: ✭ 452 (-15.67%)
Mutual labels:  active-directory
Pode
Pode is a Cross-Platform PowerShell web framework for creating REST APIs, Web Sites, and TCP/SMTP servers
Stars: ✭ 329 (-38.62%)
Mutual labels:  active-directory
Gorm Adapter
Gorm adapter for Casbin
Stars: ✭ 373 (-30.41%)
Mutual labels:  acl
Vokuro
Sample application for Phalcon Framework (Acl, Auth, Security)
Stars: ✭ 350 (-34.7%)
Mutual labels:  acl
Vue Acl
Access Control List plugin for VueJS 2.0
Stars: ✭ 376 (-29.85%)
Mutual labels:  acl
Security Acl
Symfony Security ACL Component
Stars: ✭ 321 (-40.11%)
Mutual labels:  acl
Orgkit
Provision a brand-new company with proper defaults in Windows, Offic365, and Azure
Stars: ✭ 490 (-8.58%)
Mutual labels:  active-directory
Laravel Acl
This package helps you to associate users with permissions and permission groups with laravel framework
Stars: ✭ 404 (-24.63%)
Mutual labels:  acl
Permissionmanager
Admin interface for managing users, roles, permissions, using Backpack CRUD
Stars: ✭ 363 (-32.28%)
Mutual labels:  acl
Vulnerable Ad
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Stars: ✭ 360 (-32.84%)
Mutual labels:  active-directory
Nlp Conference Compendium
Compendium of the resources available from top NLP conferences.
Stars: ✭ 349 (-34.89%)
Mutual labels:  acl
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-28.73%)
Mutual labels:  active-directory
Nlp Papers With Arxiv
Statistics and accepted paper list of NLP conferences with arXiv link
Stars: ✭ 345 (-35.63%)
Mutual labels:  acl
Chn Iplist
Chnroutes rules for routers、Shadowrocket、Quantumult、Kitsunebi、acl、BifrostV、v2rayNG、v2rayN、clash、pac、Qv2ray、v2ray config file.
Stars: ✭ 469 (-12.5%)
Mutual labels:  acl
Zoonavigator
Web-based ZooKeeper UI / editor / browser
Stars: ✭ 326 (-39.18%)
Mutual labels:  acl
Hunter
(l)user hunter using WinAPI calls only
Stars: ✭ 359 (-33.02%)
Mutual labels:  active-directory
Casbin Rs
An authorization library that supports access control models like ACL, RBAC, ABAC in Rust.
Stars: ✭ 375 (-30.04%)
Mutual labels:  acl
Crackmapexec
A swiss army knife for pentesting networks
Stars: ✭ 5,445 (+915.86%)
Mutual labels:  active-directory
Darthsidious
Building an Active Directory domain and hacking it
Stars: ✭ 479 (-10.63%)
Mutual labels:  active-directory

ACLight

A tool for advanced discovery of Privileged Accounts - including Shadow Admins.
ACLight2 is the improved version of the tool.

Shadow Admins Research

The tool (version 1) was published as part of the "Shadow Admins" research - more details on "Shadow Admins" are in the blog post: https://www.cyberark.com/threat-research-blog/shadow-admins-stealthy-accounts-fear

The research was also presented at the InfoSecurity conference, London: presentation link

Overview

ACLight is a tool for discovering privileged accounts through advanced ACLs analysis (objects’ ACLs - Access Lists, aka DACL\ACEs).
It includes the discovery of Shadow Admins in the scanned network.

The tool queries the Active Directory (AD) for its objects' ACLs and then filters and analyzes the sensitive permissions of each one. The result is a list of most privileged accounts in the network (from the advanced ACLs perspective of the AD). You can run the scan with just any regular user, it could be a non-privileged user because it only performs legitimate read-only LDAP queries to the AD.

Just run it and check the result.

You should take care of all the privileged accounts that the tool discovers for you.
Especially - take care of the Shadow Admins - those are accounts with direct sensitive ACLs assignments (as opposed of getting privileges as part of membership in known privileged groups).

For scanning cloud environments and discover the most privileged entities in AWS and Azure, check the new open source tool - SkyArk:
https://github.com/cyberark/SkyArk

ACLight2

This is ACLight2 - the new version of ACLight scan. It’s much quicker, has a new scan architecture and better results.
It solves scalability and performance issues from the previous version.

In addition, ACLight2 is built on a recursive scan and provides multi-layered privileged accounts analysis.
As a first step, the scan starts by building the first layer of privileged accounts. Those are the accounts who have direct privileges over the domain’s sensitive objects. Then, as a second step, the tool continues and scans the ACLs over those newly discovered privileged accounts from layer 1 and builds an optional second layer of new privileged accounts who have privileges over the accounts from the first layer. This second step is recursive, the tool keeps scanning for more optional layers of privileged accounts until all the privileged accounts chains are being enumerated.

Usage:

Option 1:

  • Double click on "Execute-ACLight.bat".

Option 2:

  • Open PowerShell (with -ExecutionPolicy Bypass)
  • Go to "ACLight2" main folder
  • “Import-Module '.\ACLight2.psm1'”
  • “Start-ACLsAnalysis”

Choose the target domain:
By default, ACLight automatically scans all the domains of the scanned network forest. You can use the “Domain” parameter if you are interested in scanning only one specific domain:

  • Start-ACLsAnalysis -domain "DomainName.com"

ACLight2 DEMO:
Demo

Reading the results files:

  1. First, check the scan’s executive summary "Privileged Accounts - Layers Analysis.txt" - It's an important and straight-forward list of the most privileged accounts that were discovered in the scanned network.
  2. "Privileged Accounts Permissions - Final Report.csv" - This is the final summary report, in this file you will find what are the exact sensitive permissions each account has.
  3. "Privileged Accounts Permissions - Irregular Accounts.csv", similar to the final report with only the privileged accounts that have direct assignment of ACL permissions (not through their group membership).

References:

The tool uses functions from the open source project PowerView by Will Schroeder (@harmj0y) - a great project.

For more comments and questions, you can contact Asaf Hecht (@Hechtov) and CyberArk Labs.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].