Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Entra ID support + AU techniques #566

Merged
merged 36 commits into from
Sep 13, 2024

Conversation

siigil
Copy link
Contributor

@siigil siigil commented Sep 5, 2024

What does this PR do?

  • Adds "Scoped Role Assignment Through HiddenMembership AU" technique (azure.persistence.hidden-au)
  • Adds "Restricted Backdoor Account Through Restricted Management AU" technique (azure.persistence.restricted-au)
  • Uses existing azidentity methods in Azure provider for authentication to Microsoft Graph
  • Uses msgraph-sdk-go, msgraph-beta-sdk-go, and msgraph-sdk-go-core for Microsoft Graph activities
  • kiota dependencies introduced through msgraph-sdk-go usage

Motivation

  • Through research into Entra ID Administrative Units (AUs), methods to utilize AUs for privileged persistence were identified. Details on the workflow and impact can be found in documentation below, with further details upcoming in a blog + fwd:cloudsec talk.

Checklist

  • The attack technique emulates a single attack step, not a full attack chain
  • We have factual evidence & references that the attack technique was used by real malware, pentesters, or attackers
    -- Attack technique is based on upcoming research, but has not been observed in the wild
  • The attack technique makes no assumption about the state of the environment prior to warming it up

Copy link
Contributor

@christophetd christophetd left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will add a bit of context to the attacks markdown and need to retest hidden-au

@christophetd
Copy link
Contributor

closes #451

@christophetd
Copy link
Contributor

@siigil feel free to review the 2 attack techniques I pushed

@siigil
Copy link
Contributor Author

siigil commented Sep 12, 2024

To document, I've reviewed the techniques @christophetd added and approve they look good + work on my system.
(Comment in place of formal approval, as I can't since I'm PR author.)

@christophetd christophetd merged commit 5627c46 into main Sep 13, 2024
5 checks passed
@christophetd christophetd deleted the katie.knowles/stratus-administrative-units branch September 13, 2024 21:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants