Academy

Module 4 · AD ACL Abuse — Twenty Years of Accumulated Trust 🔒

Manish Garg
Manish Garg Associate CISSP · RingSafe
April 22, 2026
4 min read

Every object in Active Directory has an Access Control List. Over twenty years, those ACLs accumulate: helpdesk delegations, application installers’ rights, service account permissions, legacy admin groups. Most organizations have never audited their AD ACLs comprehensively. Attackers use BloodHound to find the exceptions, and those exceptions are usually the fastest path to Domain Admin.

Why ACL abuse is ubiquitous

AD’s ACL model is powerful. You can delegate “password reset on this OU” to the helpdesk, “join this computer to domain” to a specific service, “modify group membership” to a manager. Each delegation is justified, individually. Over time, the set becomes an attack surface.

Unlike misconfigurations that can be “fixed by policy,” ACL sprawl is operationally entangled. You can’t just remove helpdesk’s password-reset right without breaking helpdesk. You have to audit + justify + sometimes refactor.

🔐 Intermediate Module · Basic Tier

Continue reading with Basic tier (₹499/month)

You've read 50% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn