-
Notifications
You must be signed in to change notification settings - Fork 300
Description
Feature Description
BloodHound currently lacks the necessary elements to fully audit BadSuccessor attack paths introduced in Windows Server 2025 via delegated Managed Service Accounts (dMSA).
Missing Elements
As acknowledged in your own linkedin post 9 months ago :
-
Create msDS-DelegatedManagedServiceAccountACE collection — SharpHound does not collectCreateChildACEs scoped specifically to themsDS-DelegatedManagedServiceAccountobject type. This is the most direct and common BadSuccessor attack right and is completely invisible in the current graph. -
Create all child objectsACE collection — GenericCreateChildACEs on OUs are not ingested as attack edges, meaning any principal with this right over an OU does not appear as a potential BadSuccessor attacker in the graph. -
dMSA nodes — BloodHound does not model
msDS-DelegatedManagedServiceAccountobjects as nodes, meaning existing dMSAs in the environment and theirmsDS-SupersededManagedAccountLinkrelationships to privileged accounts are not visible or traversable in the graph.
Request
- Add SharpHound collection of
CreateChildACEs on OUs, both generic and scoped tomsDS-DelegatedManagedServiceAccount - Add dMSA as a node type with edges representing
msDS-SupersededManagedAccountLinkrelationships - Add corresponding attack path edges so the full escalation chain is visible in the graph