TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Abusing Active Directory Certificate Services (Part 4)

BHIS · 2024-05-30 · Read original ↗

ATT&CK techniques detected

7 predictions
T1649Steal or Forge Authentication Certificates
95%
“abusing active directory certificate services ( part 4 ) abusing active directory certificate services ( part 4 ) start this blog series from the beginning here : part 1 misconfigurations in active directory certificate services ( adcs ) can introduce critical vulnerabilities int…”
T1649Steal or Forge Authentication Certificates
92%
“##py - certify : https : / / github. com / ghostpack / certify read more in this series : - abusing active directory certificate services ( part 1 ) - abusing active directory certificate services ( part 2 ) - abusing active directory certificate services ( part 3 ) - detecting a…”
T1649Steal or Forge Authentication Certificates
87%
“. foobar. com ' \ - ca ' foobar - ca ' \ - template ' esc3 _ user _ 1 ' - debug take note of the returned request id or an object sid then we can use our certificate generated for bspears to request a certificate on behalf of the administrator account using the “ esc3 _ user _ 2 …”
T1649Steal or Forge Authentication Certificates
85%
“of another domain account. to find a certificate vulnerable to esc2, we can enumerate adcs configurations with certipy. by specifying the - enabled and - vulnerable flags, we can tell certipy to specifically print out vulnerable templates that are enabled. certipy find - u ' bspe…”
T1649Steal or Forge Authentication Certificates
74%
“privilege user, which we could then use to request a certificate on behalf of a domain administrator account. esc3 the certificate request agent eku can be used to request a certificate on behalf of another domain object. templates vulnerable to esc3 are configured with this eku …”
T1649Steal or Forge Authentication Certificates
38%
“eku or without an eku configuration. a template that specifies the any purpose eku can allow an attacker to create a certificate with any purpose such as code signing, client authentication, etc. such a certificate can be used to authenticate to active directory as the user who o…”
T1558.003Kerberoasting
36%
“in esc2. each escalation technique combined overly permissive enrollment rights with extended key usage configurations. however, the conditions of the vulnerable templates for each technique are slightly different. in both examples, we were able to obtain a certificate on behalf …”

Summary

Start this blog series from the beginning here: PART 1 Misconfigurations in Active Directory Certificate Services (ADCS) can introduce critical vulnerabilities into an Enterprise environment. In this article, we will […]

The post Abusing Active Directory Certificate Services (Part 4) appeared first on Black Hills Information Security, Inc..