TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Abusing Active Directory Certificate Services (Part 2)

BHIS · 2023-10-12 · Read original ↗

ATT&CK techniques detected

6 predictions
T1649Steal or Forge Authentication Certificates
94%
“- revoke - certificate - in - windows - ad - cs - https : / / www. thehacker. recipes / ad / movement / ad - cs / certificate - templates - https : / / dirkjanm. io / ntlm - relaying - to - ad - certificate - services / - pkinittools : https : / / github. com / dirkjanm / pkinitt…”
T1649Steal or Forge Authentication Certificates
93%
“abusing active directory certificate services ( part 2 ) abusing active directory certificate services ( part 2 ) misconfigurations in active directory certificate services ( adcs ) can introduce critical vulnerabilities into an enterprise active directory environment, such as pa…”
T1649Steal or Forge Authentication Certificates
87%
“##s 4900 and 4899 occur when an adcs object changes and enrollment occurs. by monitoring certificate change events, an administrator can alert on anomalous behavior, investigate template changes, and revoke certificates that appear to be malicious or suspicious. some useful event…”
T1649Steal or Forge Authentication Certificates
80%
“##sing active directory certificate services ( part 3 ) - abusing active directory certificate services ( part 4 ) - detecting adcs privilege escalation ready to learn more? level up your skills with affordable classes from antisyphon! pay - forward - what - you - can training av…”
T1649Steal or Forge Authentication Certificates
74%
“certipy results will return the request id or an object sid. note this, as you will need this information to revoke the certificate once the test is completed. update on april 21, 2025 microsoft recently pushed a partial patch to attempt to prevent privilege escalation. a link to…”
T1649Steal or Forge Authentication Certificates
62%
“template ' < vulnerable _ template _ name > ' \ - upn < domain _ admin > - sid < < domain _ admin _ sid > end update once we have our certificate, we can use the certificate to obtain the credential hash and a kerberos ticket of the target da account using the certipy - auth comm…”

Summary

Misconfigurations in Active Directory Certificate Services (ADCS) can introduce critical vulnerabilities into an Enterprise Active Directory environment, such as paths of escalation from low privileged accounts to domain administrator.

The post Abusing Active Directory Certificate Services (Part 2) appeared first on Black Hills Information Security, Inc..