AD Certificates

See HEREarrow-up-right.

A CA (Certification Authority) is part of the Active Directory Certificate Services (AD CS).

A CA is installed when the organization wants to use:

  • Authentication via certificates (Kerberos authentication with certificate (PKINIT) instead of using passwords/hashes)

  • Smart cards, VPN certificates, corporate Wi-Fi

  • Single Sign-On with certificates

  • Or when certificates are needed for machines/users/services

Identification

Use Certipyarrow-up-right for enumeration and identifying vulnerable templates.

certipy find -vulnerable -u <USER>@<DOMAIN> -p <PASSWORD> -dc-ip <DC> -stdout

Attacks

Golden Certificate

If you compromise the CA (obtain its .pfx), you can:

  • Sign a certificate for Administrator

  • Use it to obtain a TGT via PKINIT

  • Access the domain as if you were him

If you have read access to the disk, from the Windows victim:

Obtain its .pfx

Use Certipyarrow-up-right from linux to craft Golden Certificate.

Always use sudo ntpdate <DC_IP> before.

Account Persistance.

Domain Escalation. (see also herearrow-up-right)

Domain Persistance

Certificate Theft

Last updated