Abuse Info
See the AllowedToAct edge section for abuse infoOpsec Considerations
See the AllowedToAct edge section for opsec considerationsEdge Schema
Source: User, Group, ComputerDestination: User, Computer
Traversable: Yes
References
- https://attack.mitre.org/techniques/T1098/
- https://dirkjanm.io/abusing-forgotten-permissions-on-precreated-computer-objects-in-active-directory/
- https://docs.microsoft.com/en-us/windows/win32/adschema/r-user-account-restrictions
- https://specterops.io/blog/2022/08/03/introducing-bloodhound-4-2-the-azure-refactor/