Enumeration
ADCS Misconfigurations/Vulnerabilities enumeration
1) Get templates information
certutil -v -dsTemplate
certify.exe find [/vulnerable]
certipy find -u USER@DOMAIN -p PASSWORD -dc-ip DC -vulnerableIf we find true positive results, we proceed to exploitation via ESC1 (Request a certificate from a vulnerable template), ESC2 and ESC3 (Use an enrollment agent to request a certificate) Techniques
2) Get ACL Information
certipy find -u USER@DOMAIN -p PASSWORD -dc-ip DOMAIN_CONTROLLERIf we find true positive results, we proceed to exploitation via ESC4 and ESC7 techniques
3) Display CA Information
certutil -TCAInfo
certify.exe cas4) Get PKI Objects Information
If we find true positive results, we proceed to exploitation via ESC5 technique
5) Get CA Flags (if remote registry is enabled)
If we find true positive results, we proceed to exploitation via ESC6 technique
If Web enrollment is up, we can proceed to exploitation via the ESC8 technique
Misconfigured Certificate Mapping (blind test) (ESC9/ESC10)
PreviousDomain Persistence (DPERSIST)NextCompromising Forests with Certificates Explained in Passive Voice
Last updated