TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Abusing Active Directory Certificate Services (Part 1)

BHIS · 2023-10-05 · Read original ↗

ATT&CK techniques detected

12 predictions
T1649Steal or Forge Authentication Certificates
95%
"true - enabled : true - enrollee supplies subject : true - requires management approval : false - authorized signatures required : 0 upon investigating the certipy output file “ 20230602164801 _ certipy. txt ”, we notice that certipy found an esc1 vulnerability on the first templ…"
T1649Steal or Forge Authentication Certificates
92%
"/ 2022 / 06 / certified _ pre - owned. pdf - specterops blog post : https : / / posts. specterops. io / certified - pre - owned - d95910965cd2 - https : / / specterops. io / wp - content / uploads / sites / 3 / 2022 / 06 / an _ ace _ up _ the _ sleeve. pdf - https : / / www. secu…"
T1649Steal or Forge Authentication Certificates
91%
": https : / / github. com / ghostpack / certify abusing misconfigured templates certificate templates are active directory objects used to define certificate policies. in the certificate template, an admin can specify settings such as the subject ( the identity ), validity period…"
T1649Steal or Forge Authentication Certificates
91%
"abusing active directory certificate services ( part 1 ) abusing active directory certificate services ( part 1 ) active directory certificate services ( adcs ) 1 is used for public key infrastructure in an active directory environment. adcs is widely used in enterprise active di…"
T1649Steal or Forge Authentication Certificates
89%
"the overly permissive adcs template, we were able to escalate from a normal domain account to a domain administrator account. validity period it is important to note that the certificate obtained will be valid for the da account until the validity period ends unless the certifica…"
T1649Steal or Forge Authentication Certificates
88%
"to help identify vulnerabilities and exploit active directory certificate services. similarly, tools have been published to help blue teamers identify and remediate these issues. this blog post is the start of a short series that will cover adcs attacks primarily using certipy ( …"
T1558.003Kerberoasting
81%
") sessionerror : status _ not _ supported ` you can try to use kerberos authentication instead of username and password. gabriel prud ’ homme ( vendetce ) taught me this work around so if it works for you hit him up and tell him how dope he is! to get a service ticket for your us…"
T1649Steal or Forge Authentication Certificates
79%
"- ip – domain controller ip addresstarget – target ca ( certificate authority ) dns ( domain name system ) nameca – short ca nametemplate – vulnerable template nameupn – target user / object name the full certipy command is shown below : certipy req - u ' [ email protected ] ' \ …"
T1649Steal or Forge Authentication Certificates
77%
"##rti : https : / / github. com / zer1t0 / certi - impacket : https : / / github. com / fortra / impacket - certipy : https : / / github. com / ly4k / certipy - certify : https : / / github. com / ghostpack / certify read more in this series : - abusing active directory certifica…"
T1649Steal or Forge Authentication Certificates
72%
"be found here : https : / / support. microsoft. com / en - us / topic / kb5014754 - certificate - based - authentication - changes - on - windows - domain - controllers - ad2c23b0 - 15d8 - 4340 - a468 - 4d4f3b188f16 if you receive an error that looks like this : you can work arou…"
T1649Steal or Forge Authentication Certificates
66%
"what can we do to prevent and detect such attacks? here are a few steps you can take to harden your certificate templates. - take stock of your certificate templates and determine whether all enabled templates are currently in use. disable all templates that are unnecessary. - ma…"
T1558Steal or Forge Kerberos Tickets
37%
") sessionerror : status _ not _ supported ` you can try to use kerberos authentication instead of username and password. gabriel prud ’ homme ( vendetce ) taught me this work around so if it works for you hit him up and tell him how dope he is! to get a service ticket for your us…"

Summary

Active Directory Certificate Services (ADCS) is used for public key infrastructure in an Active Directory environment. ADCS is widely used in enterprise Active Directory environments for managing certificates for systems, users, applications, and more.

The post Abusing Active Directory Certificate Services (Part 1) appeared first on Black Hills Information Security, Inc..