Abuse Info
Windows
Step 1: Use Certify (2.0) to request enrollment in the affected template, specifying the affected certification authority and target principal to impersonate:Linux
Step 1: Use Certipy to request enrollment in the affected template, specifying the target enterprise CA and target principal to impersonate:Opsec Considerations
When the affected certificate authority issues the certificate to the attacker, it will retain a local copy of that certificate in its issued certificates store. Defenders may analyze those issued certificates to identify illegitimately issued certificates and identify the principal that requested the certificate, as well as the target identity the attacker is attempting to impersonate.References
This edge is related to the following MITRE ATT&CK tactic and techniques:Abuse and Opsec references
- Certipy
- Rubeus
- https://specterops.io/wp-content/uploads/sites/3/2022/06/Certified_Pre-Owned.pdf
- https://book.hacktricks.xyz/windows-hardening/active-directory-methodology/ad-certificates/domain-escalation#misconfigured-certificate-templates-esc1
- https://hideandsec.sh/books/cheatsheets-82c/page/active-directory-certificate-ser