Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BHCE does not honor on-premise AD deny ACLs #392

Open
TasteOfSpaghetti opened this issue Feb 7, 2024 · 0 comments
Open

BHCE does not honor on-premise AD deny ACLs #392

TasteOfSpaghetti opened this issue Feb 7, 2024 · 0 comments
Labels
enhancement New feature or request ticketed (automation only) Ticket has been created internally for tracking

Comments

@TasteOfSpaghetti
Copy link

TasteOfSpaghetti commented Feb 7, 2024

Feature Description:
BHCE should honor deny ACLs to combat false attack paths.

Provide a clear and concise description of the feature you're requesting.
It would be great if BHCE ingested and processed deny ACLs, to combat false attack paths.

Current Behavior:
BHCE does not ingest and process deny ACLs from on-premise Active Directory.

Explain how the software behaves currently in relation to the feature you're requesting.
BHCE does currently not honor deny ACLs in on-prem AD, which results in false attack paths. An example is the GenericAll/FullControl ACL on computer objects, that can be abused to perform the Resource Based Constrained Delegation attack. However, if there is a deny ACL for the write permissions on the "msDS-AllowedToActOnBehalfOfOtherIdentity" attribute, this attack is not possible, but BHCE still shows the attack path.

Desired Behavior:
BHCE does ingest and process deny ACLs from on-premise Active Directory.

Describe how you envision the software behaving after the proposed feature is implemented.
BHCE does ingest and process deny ACLs from on-premise Active Directory and therefore removes attack paths based on that.

Use Case:

Explain the context in which this feature would be useful. How will it benefit users or contributors?
Specifically for the RBCD attack path, there might be deny ACLs in place that blocks the write capability to the "msDS-AllowedToActOnBehalfOfOtherIdentity" attribute, which invalidates the attack path.

@TasteOfSpaghetti TasteOfSpaghetti added enhancement New feature or request triage This issue requires triaging labels Feb 7, 2024
@slokie-so slokie-so added ticketed (automation only) Ticket has been created internally for tracking and removed triage This issue requires triaging labels Mar 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request ticketed (automation only) Ticket has been created internally for tracking
Projects
None yet
Development

No branches or pull requests

2 participants