๐ ๏ธADCS
Abusing Active Directory Certificate Services (ADCS)
ADCS
Info
Search CA
โโโ(kaliใฟkali)-[~/โฆ/machines/lab/certified-medium/certify]
โโ$ netexec ldap domain_controlled -d domain.local -u 'user' -p 'password' -M adcs
SMB 10.10.11.41 445 DC01 [*] Windows 10 / Server 2019 Build 17763 x64 (name:DC01) (domain:domain.loca) (signing:True) (SMBv1:False)
LDAP 10.10.11.41 389 DC01 [+] domain.local\user:password
ADCS 10.10.11.41 389 DC01 [*] Starting LDAP search with search filter '(objectClass=pKIEnrollmentService)'
ADCS 10.10.11.41 389 DC01 Found PKI Enrollment Server: DC01.domain.local
ADCS 10.10.11.41 389 DC01 Found CN: certified-DC01-CA
certify.exe find /vulnerablecertipy find -u 'user' -hashes '3b181b914e7a9d5508ea1e20bc2b7fce' -dc-ip 10.10.11.51 certipy find -u '[email protected]' -p <password> -dc-ip <DC_IP> -vulnerable -enabledExtracting ccache
Extracting nthash
Convert Certificate obtained from Windows
Authenticate in windows
Certificate Authentication and extract NTLM
Create a Sacrificial Logon Session with Rubeus
Import Base64 Ticketin into the Powershell session using Rubeus
ESC1 - template-allows-san
ESC2 - variation of ESC1
ESC3 - Misconfigured Enrollment Agent Templates
ESC4 - certificate-templates
ESC5
ESC6
ESC7
ESC8
ESC9 - no-security-extension
ESC10
ESC11
ESC12
ESC13
ESC14
ESC15
Risorse
Last updated