sAMAccountName of a targeted principal. Example: If the targeted principal is Administrator@corp.local user, the victim’s UPN will be populated with “Administrator” (without the @corp.local ending). The attacker principal will then abuse their control over the victim principal to obtain the credentials of the victim principal, or a session as the victim principal, and enroll a certificate as the victim in one of the affected certificate templates. The UPN of the victim (“Administrator”) will be included in the issued certificate under the SAN. As the certificate template does not have the security extension, it will NOT include the SID of the victim user in the issued certificate. Next, the attacker principal will again set the UPN of the victim, this time to an arbitrary string (e.g. the original value). The issued certificate can now be used for authentication against an affected DC. The weak certificate binding configuration on the DC will make the DC accept that the SID of the victim user is not present in the issued certificate when performing Kerberos authentication, and it will use the SAN value to map the certificate to a principal. The DC will attempt to find a principal with a UPN matching the SAN value (“Administrator”) but as the victim’s UPN has been changed after the enrollment, there will be no principals with this UPN. The DC will then attempt to find a principal with a sAMAccountName matching the SAN value and find the targeted user. At last, the DC issues a Kerberos TGT as the targeted user to the attacker, which means the attacker now has a session as the targeted user. In case the target is a computer, the DC will find it as well as the DC will attempt sAMAccountName matching with a $ at the end of the SAN value as last resort.
Abuse Info
Windows
Step 1: Set UPN of victim to targeted principal’ssAMAccountName. Set the UPN of the victim principal using PowerView:
- Shadow Credentials attack (see AddKeyCredentialLink edge documentation).
- Password reset (see ForceChangePassword edge documentation).
- Targeted Kerberoasting (see WriteSPN edge documentation).
Linux
Step 1: Set UPN of victim to targeted principal’ssAMAccountName. Set the UPN of the victim principal using Certipy:
- Shadow Credentials attack (see AddKeyCredentialLink edge documentation).
- Password reset (see ForceChangePassword edge documentation).
- Targeted Kerberoasting (see WriteSPN edge documentation).
Opsec Considerations
When the affected certificate authority issues the certificate to the attacker, it will retain a local copy of that certificate in its issued certificates store. Defenders may analyze those issued certificates to identify illegitimately issued certificates and identify the principal that requested the certificate, as well as the target identity the attacker is attempting to impersonate.Edge Schema
Source: User, Group, ComputerDestination: Domain
Traversable: Yes