-
Notifications
You must be signed in to change notification settings - Fork 32
UC ‐ Abusing Hidden Dangerous Roles in Entra ID
Execute reconnaissance & escalate privileges in Entra ID using hidden privileged roles
"Partner Tier2 Support" is a hidden role in Entra ID. According to Microsoft it is "deprecated" and "will be removed from Microsoft Entra ID in the future". However, as of this writing the role still remains available and is very much assignable to an identity.
What's the fuss? It's hidden on the Microsoft Entra ID portal, making the role harder to assign and even harder to audit for administrators. How can you look for something you don't know exists?
The SpectreOps blog referenced below is the original work identifying this issue and provides great details on it. So if you are interested in learning more about the issue it is highly recommended you check out the blog.
Partner Tier2 Support is also a highly privileged role and grants a lot of powerful permissions in the environment including ability to escalate itself or anyone to Global Admin.
An adversary with permissions to recon and assign this role in the environment can abuse its permissions or escalate privileges to Global Admin to perform further damage.
Alternatively, adversaries may attempt to identify other identities in environment with these hidden roles and target them.
Tactics | Initial Access, Discovery, Privilege Escalation |
---|---|
Techniques | T1078, T1069, T1098 |
Recon the hidden role information and then attempt to assign the role to a user.
Using Halberd's Role Recon dashboard users can easily look for information even on such hidden roles.
- Establish access using any Halberd
Access
modules - Navigate to
Recon
page - Select
Roles
recon dashboard - Enter "Partner Tier2 Support" in the search and press
RECON
- Review collected info on page
Using Halberd's Entra ID role assignment technique users can attempt privilege escalation in environment.
- Establish Access using Halberd
Access
modules (Not required if done previously) - Navigate to
Attack
>Entra ID
- Select
Privilege Escalation
from Tactics dropdown - Select technique : "Assign Directory Role to User"
- Enter user to assign role to
- Enter "Partner Tier2 Support" for role
- Press
EXECUTE TECHNIQUE
- Checkout technique result in
Response
section
- Original Blog - The Most Dangerous Entra Role You’ve (Probably) Never Heard Of by SpecterOps
- Microsoft Role Documentation - Partner Tier 2 Support