The principal has control over a victim computer with permission to enroll on one or more certificate templates, configured to: 1) enable certificate authentication, 2) require the dNSHostName
of the enrollee included in the Subject Alternative Name (SAN), and 3) not have the security extension enabled.
dNSHostName
attribute to match the dNSHostName
of a targeted computer. The attacker principal will then abuse their control over the victim computer to obtain the credentials of the victim computer, or a session as the victim computer, and enroll a certificate as the victim in one of the affected certificate templates. The dNSHostName
of the victim will be included in the issued certificate under SAN DNS name. As the certificate template does not have the security extension, the issued certificate will NOT include the SID of the victim computer. DCs with strong certificate binding configuration will require a SID to be present in a certificate used for Kerberos authentication, but the affected DCs with weak certificate binding configuration will not. The affected DCs will split the SAN DNS name into a computer name and a domain name, confirm that the domain name is correct, and use the computer name appended a $ to identify principals with a matching sAMAccountName
. At last, the DC issues a Kerberos TGT as the targeted computer to the attacker, which means the attacker now has a session as the targeted computer.
dNSHostName
on victim.
The SPNs of the victim will be automatically updated when you change the dNSHostName
. AD will not allow the same SPN entry to be set on two accounts. Therefore, you must remove any SPN on the victim account that includes the victim’s dNSHostName
.
Set SPN of the victim computer using PowerView:
dNSHostName
of victim computer to targeted computer’s dNSHostName
.
Set the dNSHostName
of the victim computer using PowerView:
dNSHostName
and SPN of victim to the previous values.
To avoid issues in the environment, set the dNSHostName
and SPN of the victim computer back to its previous values using PowerView:
dNSHostName
on victim.
The SPNs of the victim will be automatically updated when you change the dNSHostName
. AD will not allow the same SPN entry to be set on two accounts. Therefore, you must remove any SPN on the victim account that includes the victim’s dNSHostName
.
Remove SPN entries with ldapmodify:
dNSHostName
of victim computer to targeted computer’s dNSHostName
.
Set the dNSHostName
of the victim computer using Certipy:
dNSHostName
and SPN of victim to the previous values.
To avoid issues in the environment, set the dNSHostName
and SPN of the victim computer back to its previous value using Certipy and ldapmodify: