ACL Viewer for Windows: A Powerful Tool for Access Control List Analysis

Listen to this Post

GitHub – WildByDesign/ACLViewer: ACL Viewer for Windows

https://github.com/WildByDesign/ACLViewer

Access Control Lists (ACLs) are a critical component of Windows security, defining permissions for files, directories, and registry keys. The ACL Viewer tool by WildByDesign provides a streamlined way to analyze and audit ACLs, making it invaluable for penetration testers, red teams, and blue teams.

You Should Know: Key Commands and Techniques for ACL Analysis

1. Viewing ACLs with PowerShell

PowerShell offers built-in cmdlets to inspect ACLs:

Get-Acl -Path "C:\Sensitive\File.txt" | Format-List

This retrieves the ACL for a specific file.

#### **2. Modifying ACLs with icacls**

Windows includes the `icacls` utility for modifying permissions:

icacls "C:\Sensitive\Folder" /grant User:(R,W)

This grants a user Read (R) and Write (W) permissions.

#### **3. Enumerating Weak Permissions**

Weak ACLs can lead to privilege escalation. Use this PowerShell script to find writable directories:

Get-ChildItem "C:\" -Recurse | Where-Object { 
(Get-Acl $<em>.FullName).Access | 
Where-Object { $</em>.IdentityReference -match "Everyone|Authenticated Users" -and $_.FileSystemRights -match "Write" } 
} | Select-Object FullName

#### **4. Exporting ACLs for Offline Analysis**

Save ACLs to a CSV for further review:

Get-Acl "C:\Critical\Data" | Export-Csv -Path "C:\Reports\ACL_Audit.csv" -NoTypeInformation

#### **5. Detecting Dangerous Permissions**

Misconfigured registry ACLs can lead to exploits. Check registry keys:

Get-Acl -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" | Format-List

### **What Undercode Say**

ACL Viewer simplifies Windows security auditing, but manual checks with PowerShell and `icacls` remain essential. Always verify:
Inherited vs. explicit permissions
Overly permissive “Everyone” or “Users” entries
Service account privileges

For defenders, automate ACL audits with scripts. Attackers, look for writable paths to escalate privileges.

### **Expected Output:**

  • A detailed CSV of ACL permissions.
  • List of vulnerable directories/registry keys.
  • Remediation steps based on findings.

For more tools and techniques, visit the original GitHub repo: ACL Viewer.

References:

Reported By: Florian Hansemann – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image