ADCS attacks

AD CS is Microsoft’s PKI implementation that provides everything from encrypting file systems, to digital signatures, to user authentication (a large focus of our research), and more.

There are several different attack vectors including below.

  • Credential theft (dubbed THEFT1 to THEFT5)

  • Account persistence (dubbed PERSIST1 to PERSIST3)

  • Domain escalation (dubbed ESC1 to ESC8)

    • based on misconfigured certificate templates

    • based on dangerous CA configuration

    • related to access control vulnerabilities

    • based on an NTLM relay vulnerability related to the web endpoints of AD CS

  • Domain persistence (dubbed DPERSIST1 to DPERSIST3)

    • by forging certificates with a stolen CA certificates

    • by trusting rogue CA certificates

    • by maliciously creating vulnerable access controls

Initial Recon

Vulnerability Check

Certificate templates

Template allows SAN (ESC1)

When a certificate template allows to specify a subjectAltName, it is possible to request a certificate for another user. It can be used for privileges escalation if the EKU specifies Client Authentication or ANY.

Windows

See the Pass the Ticket section to convert the ticket to Linux format.

Linux

To fix CLOCK SKEY issue

Last updated