Active Directory Certificate Services
Enumeration
#Querying Cert Publishers group membership
CS C:\\Tools> net localgroup "Cert Publishers"
# Find vulnerable templates
PS C:\Tools> .\Certify.exe find /vulnerable
#Identify if there are ADCS servers in the Domain
Intrusionz3r0@htb[/htb]$ netexec ldap 10.129.205.199 -u "blwasp" -p "Password123!" -M adcs
how to Install Certipy-ad
#Certipy
Intrusionz3r0@htb[/htb]$ sudo apt install certipy-ad || pip3 install certipy-ad
Intrusionz3r0@htb[/htb]$ certipy-ad find -u 'raven' -p 'R4v3nBe5tD3veloP3r!123' -dc-ip 10.10.11.236 -vulnerable -stdoutDownload BloodHound Forked
Common Error Messages
Error Name
Description
Abusing Certificate Templates
ESC1
Linux Exploitation
Windows Exploitation
ESC2
Linux Exploitation
Windows Exploitation
ESC3
Exploitation on Linux
Exploitation on Windows
ESC9
Compromise on Linux
Compromise on Windows
ESC10
Case 1: StrongCertificateBindingEnforcement is 0x0
Case 2: CertificateMappingMethods is 0x4
Abusing CA Configuration
ESC6
Exploitation on Linux
Exploitation on Windows
Abusing Access Control
ESC4
Abuse on Linux
Abuse on Windows
ESC5 (Compromise CA Server)
Abuse from Linux
Abuse from Windows
ESC7
Attack from Linux - ManageCA rights
Attack from Linux - ManageCertificates rights
Abuse on Windows
ESC13
ESC16
NTLM Relay
ESC8
Requirements:
Three different scenarios and Methods
Scenario
Technique
Tools
Key Point
Machine
ESC8 SMB traffic available
ESC11
Miscellaneous ADCS Attacks
Certifried (CVE-2022-26923)
PKINIT
Last updated