Skip to content

Commit 72c14e0

Browse files
authored
Merge pull request #635 from siigil/katie.knowles/au-todo-update
Update AU Documentation
2 parents da1a353 + 8b735b3 commit 72c14e0

File tree

4 files changed

+4
-6
lines changed

4 files changed

+4
-6
lines changed

docs/attack-techniques/entra-id/entra-id.persistence.hidden-au.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,7 @@ Platform: Entra ID
1717
## Description
1818

1919

20-
Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU.
21-
This simulates an attacker that TODO.
20+
Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU. This simulates an attacker attempting to conceal the scope of a scoped role assignment using hidden AU membership.
2221

2322
<span style="font-variant: small-caps;">Warm-up</span>:
2423

docs/attack-techniques/entra-id/entra-id.persistence.restricted-au.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Platform: Entra ID
1717
## Description
1818

1919

20-
Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and place a backdoor account in it to simulate a protected attacker-controlled user.
20+
Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and places a backdoor account in it to simulate a protected attacker-controlled user.
2121

2222
<span style="font-variant: small-caps;">Warm-up</span>:
2323

v2/internal/attacktechniques/entra-id/persistence/hidden-au/main.go

+1-2
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,7 @@ func init() {
2121
ID: "entra-id.persistence.hidden-au",
2222
FriendlyName: "Create Hidden Scoped Role Assignment Through HiddenMembership AU",
2323
Description: `
24-
Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU.
25-
This simulates an attacker that TODO.
24+
Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU. This simulates an attacker attempting to conceal the scope of a scoped role assignment using hidden AU membership.
2625
2726
Warm-up:
2827

v2/internal/attacktechniques/entra-id/persistence/restricted-au/main.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ func init() {
2121
ID: "entra-id.persistence.restricted-au",
2222
FriendlyName: "Create Sticky Backdoor User Through Restricted Management AU",
2323
Description: `
24-
Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and place a backdoor account in it to simulate a protected attacker-controlled user.
24+
Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and places a backdoor account in it to simulate a protected attacker-controlled user.
2525
2626
Warm-up:
2727

0 commit comments

Comments
 (0)