Abuse Info
The edge is not abusable, but is used during post-processing to create abusable edges.Opsec Considerations
No opsec considerations apply to this edge.References
- https://attack.mitre.org/techniques/T1098/
- https://posts.specterops.io/azure-privilege-escalation-via-service-principal-abuse-210ae2be2a5
- https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/assign-roles-different-scopes
- https://specterops.io/blog/2023/04/18/introducing-bloodhound-4-3-get-global-admin-more-often/