heroui logo

Potentially Over Permissive Permissions Granted Using Dsacls.EXE

Sigma Rules

View Source
Summary
This detection rule is designed to identify the use of the `dsacls.exe` utility in a Windows environment to grant overly permissive permissions on Active Directory objects. `dsacls.exe` is a command-line tool that allows administrators to view and edit the Access Control List (ACL) for Active Directory objects. The rule looks for specific command-line patterns that indicate over permissive access is being granted, such as granting rights to modify or change permissions for users and groups. The underlying logic of the detection employs selection criteria that verify if `dsacls.exe` is used in conjunction with permission flags that suggest excessive access rights. This includes command line arguments like `/G` (grant) alongside permission types like GR (Generic Read), GE (Generic Execute), GW (Generic Write), GA (Generic All), WP (Write Property), and WD (Write DAC). This rule is critical for security monitoring as it helps in detecting potential misuse of permissions that could lead to privilege escalation or data breaches within an organization.
Categories
  • Windows
  • Network
  • Identity Management
Data Sources
  • Process
Created: 2022-06-20