AD Certificates Exploitation
AD Certificates Exploitation and Enumeration
ADCS Various Exploitation methods and misconfigurations
Resources are mostly from: hacktricks.xyz
Possible tools to use: PSPKIAudit, Certify https://github.com/GhostPack/Certify , Certipy https://github.com/ly4k/Certipy , Certi https://github.com/zer1t0/certi , modifyCertTemplate https://github.com/fortalice/modifyCertTemplate
Poisonous parameter combination on certificates
TIP: Disable Restricted Admin mode
Request a personal certificate
Export Certificate
Impersonation through a certificate
AD Certificate Services Enumeration
AD's certificate services can be enumerated through LDAP queries, revealing information about Enterprise Certificate Authorities (CAs) and their configurations. This is accessible by any domain-authenticated user without special privileges. Tools like Certify and Certipy are used for enumeration and vulnerability assessment in AD CS environments.
Commands:
Enumerate Enterprise CAs and certificate templates with certutil
Last updated