• Stars
    star
    181
  • Rank 212,110 (Top 5 %)
  • Language
    HTML
  • License
    GNU General Publi...
  • Created about 1 year ago
  • Updated 4 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Table of AD and Azure assets and whether they belong to Tier Zero

TierZeroTable

Table of AD and Azure assets and whether they belong to Tier Zero.

View the table here: https://specterops.github.io/TierZeroTable

Blog posts:

Webinars:

DISCLAIMER: The table does not include all Tier Zero assets yet. We will add assets to the table throughout the webinar series. So if you think we are missing something, then you are completely right. But feel free to make a pull request or open an issue with the asset you think we should add. All contributions are appreciated. Also if you disagree on something in the table :)

Table columns

Name

Common name of the asset.

Type

Type of the asset.

Values:

  • AD computer
  • AD container
  • AD domain
  • AD GPO
  • AD group
  • AD user
  • Computer host
  • DC group

IdP

Identity Provider of the asset.

Values:

  • Active Directory

Identification

How the asset can be identified. E.g., SID of AD object.

Description

Description of the asset, i.e., its purpose of existence. This will be copied from Microsoft documentation if available.

Known Tier Zero compromise by default configuration

Whether a publicly known abuse technique exists that allows compromise of Tier Zero assets using this asset. The abuse technique must work in an environment with default configurations.

If a publicly known abuse technique exists it will be described in the Reasoning column and links will be provided in the External links column.

Values:

  • YES - Takeover - A publicly known abuse technique to takeover one or more Tier Zero assets exists and works in environments with default configurations.
  • YES - Disruption - A publicly known abuse technique to disrupt the operations of Tier Zero assets exists and works in environments with default configurations.
  • NO - No publicly known abuse technique to compromise Tier Zero assets in an environment with default configurations exists.

Known Tier Zero compromise by common (mis)configuration

Whether a publicly known abuse technique exists that allows compromise of Tier Zero assets using this asset, which is enabled do to a common non-default (mis)configuration.

If a publicly known abuse technique exists it will be described in the Reasoning column and links will be provided in the External links column.

Values:

  • YES - Takeover - A publicly known abuse technique to takeover one or more Tier Zero assets exists and works in environments with a common non-default (mis)configuration.
  • YES - Disruption - A publicly known abuse technique to disrupt the operations of Tier Zero assets exists and works in environments with a common non-default (mis)configuration.
  • NO - No publicly known abuse technique to compromise Tier Zero assets in an environment with common non-default (mis)configurations exists.
  • N/A - Compromise by default - A publicly known abuse technique to compromise Tier Zero assets exists and works in environments with default configurations, hence it does not require any special configuration.

Is Tier Zero

If the asset should be considered Tier Zero based on our Definition of Tier Zero.

Reasoning

The explanation of why the asset is/isn't Tier Zero, including an abuse summary and if the asset is a security dependency for Tier Zero.

Microsoft: Privileged access security roles

Whether the asset is included in Microsoft's Privileged access security roles list.

Values:

  • YES
  • NO

AdminSDHolder protected

Whether the asset is part of the default Protected Accounts and Groups in Active Directory, which are protected with the AdminSDHolder security descriptor.

Values:

  • YES
  • NO
  • Not applicable

What is Tier Zero episode

In which episode of the What is Tier Zero series was this asset discussed.

Values:

  • 1
  • 2

External links

Links to documentation for the asset, abuse information, etc.