ADCSESC10b
The principal has control over a victim computer with permission to enroll on one or more certificate templates, configured to enable certificate authentication, and require the dNSHostName
of the enrollee included in the Subject Alternative Name (SAN).
The victim computer also has enrollment permission for an enterprise CA with the necessary templates published. This enterprise CA is trusted for NT authentication in the forest, and chains up to a root CA for the forest. There is an affected Domain Controller (DC) configured to allow UPN certificate mapping. This setup lets the principal impersonate any AD forest computer without their credentials.
The attacker principal can abuse their control over the victim computer to modify the victim computer’s dNSHostName
attribute to match the dNSHostName
of a targeted computer. The attacker principal will then abuse their control over the victim computer to obtain the credentials of the victim computer, or a session as the victim computer, and enroll a certificate as the victim in one of the affected certificate templates. The dNSHostName
of the victim will be included in the issued certificate under SAN DNS name. The UPN certificate mapping configuration on the affected DCs make it possible to authenticate over Schannel as the targeted computer. The DC will split the SAN DNS name into a computer name and a domain name, confirm that the domain name is correct, and use the computer name appended a $ to identify a computer with matching sAMAccountName
which the attacker will be authenticated as.
Abuse Info
Windows
Step 1: Remove SPNs including dNSHostName
on victim.
The SPNs of the victim will be automatically updated when you change the dNSHostName
. AD will not allow the same SPN entry to be set on two accounts. Therefore, you must remove any SPN on the victim account that includes the victim’s dNSHostName
.
Set SPN of the victim computer using PowerView:
Step 2: Create .exe version of Certipy.
Install PyInstaller on a host with python installed, clone down Certipy from GitHub, and run this cmdlet from the root of the GitHub repo to bundle the python project into an .exe binary which can be used on Windows computer where Python is not installed:
The Certipy.exe will be in the dist folder.
Step 3: Set dNSHostName
of victim computer to targeted computer’s dNSHostName
.
Set dNSHostName
of the victim principal using Certipy:
Step 4: Check if the ‘mail’ attribute of victim must be set and set it if required.
If the certificate template is of schema version 2 or above, and its attribute ‘msPKI-CertificateNameFlag’ contains the flag SUBJECT_REQUIRE_EMAIL and/or SUBJECT_ALT_REQUIRE_EMAIL, then the victim principal must have their mail attribute set for the certificate enrollment. The CertTemplate BloodHound node will have “Subject Require Email” or “Subject Alternative Name Require Email” set to true if any of the flags are present.
If the certificate template is of schema version 1 or does not have any of the email flags, then continue to Step 5.
If any of the two flags are present, you will need the victim’s mail attribute to be set. The value of the attribute will be included in the issues certificate but it is not used to identify the target principal why it can be set to any arbitrary string.
Check if the victim has the mail attribute set using PowerView:
If the victim has the mail attribute set, continue to Step 5.
If the victim does not has the mail attribute set, set it to a dummy mail using PowerView:
Step 5: Obtain a session as victim. There are several options for this step.
You can obtain a session as SYSTEM on the host, which allows you to interact with AD as the computer account, by abusing control over the computer AD object (see GenericAll edge documentation).
Step 6: Enroll certificate as victim.
Use Certipy as the victim principal to request enrollment in the affected template, specifying the affected EnterpriseCA:
The issued certificate will be saved to disk with the name of the targeted user.
Step 7 (Optional): Set dNSHostName
and SPN of victim to the previous value.
To avoid issues in the environment, set the dNSHostName
and SPN of the victim computer back to it’s previous values using Certipy and PowerView:
Step 8: Perform Schannel authentication as targeted principal against affected DC using certificate.
Open an LDAP shell as the victim using Certipy by specifying the certificate created in Step 6 and the IP of an affected DC:
Linux
Step 1: Remove SPNs including dNSHostName
on victim.
The SPNs of the victim will be automatically updated when you change the dNSHostName
. AD will not allow the same SPN entry to be set on two accounts. Therefore, you must remove any SPN on the victim account that includes the victim’s dNSHostName
.
Remove SPN entries with ldapmodify:
Step 2: Set dNSHostName
of victim computer to targeted computer’s dNSHostName
.
Set dNSHostName
of the victim principal using Certipy:
Step 3: Check if the ‘mail’ attribute of victim must be set and set it if required.
If the certificate template is of schema version 2 or above, and its attribute ‘msPKI-CertificateNameFlag’ contains the flag SUBJECT_REQUIRE_EMAIL and/or SUBJECT_ALT_REQUIRE_EMAIL, then the victim principal must have their mail attribute set for the certificate enrollment. The CertTemplate BloodHound node will have “Subject Require Email” or “Subject Alternative Name Require Email” set to true if any of the flags are present.
If the certificate template is of schema version 1 or does not have any of the email flags, then continue to Step 4.
If any of the two flags are present, you will need the victim’s mail attribute to be set. The value of the attribute will be included in the issues certificate but it is not used to identify the target principal why it can be set to any arbitrary string.
Check if the victim has the mail attribute set using ldapsearch:
If the victim has the mail attribute set, continue to Step 4.
If the victim does not has the mail attribute set, set it to a dummy mail using ldapmodify:
Step 4: Obtain a session as victim. There are several options for this step.
You can obtain a session as SYSTEM on the host, which allows you to interact with AD as the computer account, by abusing control over the computer AD object (see GenericAll edge documentation).
Step 5: Enroll certificate as victim.
Use Certipy as the victim principal to request enrollment in the affected template, specifying the affected EnterpriseCA:
The issued certificate will be saved to disk with the name of the targeted user.
Step 6 (Optional): Set dNSHostName
and SPN of victim to the previous value.
To avoid issues in the environment, set the dNSHostName
and SPN of the victim computer back to it’s previous value using Certipy and ldapmodify:
Step 7: Perform Schannel authentication as targeted principal against affected DC using certificate.
Open an LDAP shell as the victim using Certipy by specifying the certificate created in Step 5 and the IP of an affected DC:
Opsec Considerations
When the affected certificate authority issues the certificate to the attacker, it will retain a local copy of that certificate in its issued certificates store. Defenders may analyze those issued certificates to identify illegitimately issued certificates and identify the principal that requested the certificate, as well as the target identity the attacker is attempting to impersonate.
References
This edge is related to the following MITRE ATT&CK tactic and techniques: