In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the AddSelf permission in Active Directory environments. By exploiting this
First seen on hackingarticles.in
Jump to article: www.hackingarticles.in/abusing-ad-dacl-addself/
![]()

