Forwarded from APT
📄 ADCS: New Ways to Abuse ManageCA Permissions
The Certsrv service exhibits a race condition during the creation of CRL files, any standard user with ManageCA ACL and publish the CDP and carry out arbitrary file movements, ultimately leading to domain elevation of privileges.
🔗 https://whoamianony.top/posts/ad-cs-new-ways-to-abuse-manageca-permissions/
#ad #adcs #manageca #privesc
The Certsrv service exhibits a race condition during the creation of CRL files, any standard user with ManageCA ACL and publish the CDP and carry out arbitrary file movements, ultimately leading to domain elevation of privileges.
🔗 https://whoamianony.top/posts/ad-cs-new-ways-to-abuse-manageca-permissions/
#ad #adcs #manageca #privesc
👍10🔥4
Так, ADCS ESC13
https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53
P.S. А 12 тоже мимо вас прошел😅
#ad #adcs #pentest #redteam
https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53
P.S. А 12 тоже мимо вас прошел😅
#ad #adcs #pentest #redteam
Medium
ADCS ESC13 Abuse Technique
It is possible to configure an Active Directory Certificate Services (ADCS) certificate template with an issuance policy having an OID…
👍13😱1
Про принудительную аутентификацию самого центра сертификации ADCS
https://decoder.cloud/2024/02/26/hello-im-your-adcs-server-and-i-want-to-authenticate-against-you/
Не знаю в чем цель, но все равно прикольно😅
#ad #pentest #redteam #adcs
https://decoder.cloud/2024/02/26/hello-im-your-adcs-server-and-i-want-to-authenticate-against-you/
Не знаю в чем цель, но все равно прикольно😅
#ad #pentest #redteam #adcs
Decoder's Blog
Hello: I’m your ADCS server and I want to authenticate against you
In my exploration of all the components and configurations related to the Windows Active Directory Certification Services (ADCS), after the “deep dive” in Cert Publishers group, I decid…
😁8👍3😱2
Ralf Hacker Channel
Так, ADCS ESC13 https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53 P.S. А 12 тоже мимо вас прошел😅 #ad #adcs #pentest #redteam
ADCS ESC 14...
https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9
А еще много будет?
#ad #redteam #pentest #adcs
https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9
А еще много будет?
#ad #redteam #pentest #adcs
Medium
ADCS ESC14 Abuse Technique
The altSecurityIdentities attribute of Active Directory (AD) computers and users allows you to specify explicit certificate mappings. An…
👍7🤯2🔥1
Забыл написать, тут же ESC15 появился))
https://trustedsec.com/blog/ekuwu-not-just-another-ad-cs-esc
Для поиска в BloodHound CE:
И заодно нашел скрипт для патча:
https://github.com/JonasBK/Powershell/blob/master/Remediate-ESC15.ps1
#pentest #redteam #adcs
https://trustedsec.com/blog/ekuwu-not-just-another-ad-cs-esc
Для поиска в BloodHound CE:
MATCH p=(:Base)-[:Enroll|AllExtendedRights]->(ct:CertTemplate)-[:PublishedTo]->(:EnterpriseCA)-[:TrustedForNTAuth]->(:NTAuthStore)-[:NTAuthStoreFor]->(:Domain)
WHERE ct.enrolleesuppliessubject = True
AND ct.authenticationenabled = False AND ct.requiresmanagerapproval = False
AND ct.schemaversion = 1
RETURN p
И заодно нашел скрипт для патча:
https://github.com/JonasBK/Powershell/blob/master/Remediate-ESC15.ps1
#pentest #redteam #adcs
TrustedSec
EKUwu: Not just another AD CS ESC
Using default version 1 certificate templates, an attacker can exploit a vulnerability (EKUwu) to generate certificates that bypass security controls,…
1👍15🔥4🥰3😢3
Форк знаменитой утилиты certipy with many open pull requests merged, made compatible with each other, and tested
https://github.com/zimedev/certipy-merged
P.S. главное, что tested...
#soft #pentest #adcs #ad
https://github.com/zimedev/certipy-merged
Missing PRs:
211: fix ESC1 false positive
229: add smime extensions support (somehow does not work completely with certipy auth)
Merged PRs:
231: add ldap simple auth
228: add ESC15
226: fix ESC1 false positive
225: fix to solve SID overwrite errors
222: fix to allow certificate names with slashes or parentheses
210: add cross domain authentication
209: accept tgs other than HOST/target@domain
203: check web enrollment for https
201: add dcom support
200: add possibility to add more than 1 keycredential and correctly list them
198: add ldap-port option
196: add ESC13
193: add whencreated and whenmodified for templates
183: hidden import (pycryptodomex)
P.S. главное, что tested...
#soft #pentest #adcs #ad
GitHub
GitHub - zimedev/certipy-merged: Tool for Active Directory Certificate Services enumeration and abuse
Tool for Active Directory Certificate Services enumeration and abuse - zimedev/certipy-merged
🔥19👍11
При эксплуатации уязвимостей ADCS могут возникать разные ошибки. В блоге подробно рассмотрены причины популярных ошибок, а также варианты решения этих проблем
https://sensepost.com/blog/2025/diving-into-ad-cs-exploring-some-common-error-messages/
#pentest #redteam #adcs
https://sensepost.com/blog/2025/diving-into-ad-cs-exploring-some-common-error-messages/
#pentest #redteam #adcs
Sensepost
SensePost | Diving into ad cs: exploring some common error messages
Leaders in Information Security
🔥16👍6🤯4
Несколько часов назад была сильно обновлена утилита certipy. Обратим внимание, что в документации также появилось описание техники ESC16...
#redteam #pentest #ad #adcs
#redteam #pentest #ad #adcs
GitHub
GitHub - ly4k/Certipy: Tool for Active Directory Certificate Services enumeration and abuse
Tool for Active Directory Certificate Services enumeration and abuse - ly4k/Certipy
2👍36🔥7🥰1
Полный гайд по эксплуатации ADCS от ESC1 до ESC16. Понятно, что материалов по этой теме и так много, но пусть будет под рукой))
https://xbz0n.sh/blog/adcs-complete-attack-reference
#ad #adcs #privesc #pentest #redteam
https://xbz0n.sh/blog/adcs-complete-attack-reference
#ad #adcs #privesc #pentest #redteam
xbz0n.sh
Breaking ADCS: ESC1 to ESC16 Attack Techniques
Let's talk about Active Directory Certificate Services. If you've been doing red team work for any length of time, you've probably heard about ADCS attacks. ...
👍37🔥17🥰1