The Cyber Threat Perspective

Episode 173: How to Find Insecure Active Directory Permissions with ADeleg


Listen Later

How do you find insecure permissions in Active Directory before they turn into attack paths?

In this episode, we take a practical look at how to identify insecure Active Directory permissions using ADeleg, a free security tool trusted by penetration testers.

Misconfigured delegation and overly permissive access rights are a common source of risk in Active Directory environments. These gaps can create hidden attack paths—but many teams don’t know where to look or how to interpret what they’re seeing.

In this episode, we cover:

  • How to identify insecure permissions in Active Directory
  • What to look for in high-risk users and groups like Domain Users, Everyone, and Authenticated Users
  • How these misconfigurations translate into real-world attack paths
  • How to use ADeleg to analyze delegated permissions and uncover hidden risk

We also include a reference to ADeleginator, a related tool that can help automate parts of this process using PowerShell. While this episode focuses on hands-on analysis with ADeleg, ADeleginator is a useful companion for scaling this work.

Tools referenced:

ADeleg: https://github.com/mtth-bfft/adeleg



Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://spenceralessi.com

Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

...more
View all episodesView all episodes
Download on the App Store

The Cyber Threat PerspectiveBy SecurIT360

  • 5
  • 5
  • 5
  • 5
  • 5

5

15 ratings


More shows like The Cyber Threat Perspective

View all
CyberWire Daily by N2K Networks

CyberWire Daily

1,026 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,079 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

138 Listeners