ADCS attacks
AD CS is Microsoft’s PKI implementation that provides everything from encrypting file systems, to digital signatures, to user authentication (a large focus of our research), and more.
There are several different attack vectors including below.
Credential theft (dubbed THEFT1 to THEFT5)
Account persistence (dubbed PERSIST1 to PERSIST3)
Domain escalation (dubbed ESC1 to ESC8)
based on misconfigured certificate templates
based on dangerous CA configuration
related to access control vulnerabilities
based on an NTLM relay vulnerability related to the web endpoints of AD CS
Domain persistence (dubbed DPERSIST1 to DPERSIST3)
by forging certificates with a stolen CA certificates
by trusting rogue CA certificates
by maliciously creating vulnerable access controls
Initial Recon
Vulnerability Check

Certificate templates
Template allows SAN (ESC1)
When a certificate template allows to specify a subjectAltName, it is possible to request a certificate for another user. It can be used for privileges escalation if the EKU specifies Client Authentication or ANY.
Windows

See the Pass the Ticket section to convert the ticket to Linux format.
Linux
To fix CLOCK SKEY issue
Last updated