kemal tamkoc

Offensive Cyber Security Consultant

ADCS Abuse Methods

Well we installed the ADCS in previous blog. Now we can come to the security side of it. But first we need to understand the background of the ADCS little bit.

What the hell is ADCS and Why?

The Active Directory Certificate Service (ADCS) is responsible from management of certificates with Public Key Infrastructure (PKI) in Active Directory environment. It allows us to issue x509 certificates over Certificate Templates to work with smart card logins, email encryption, VPN authentication, code signing, protecting service-to-service communication and more.

In this blog we will go trough ADCS abuse mechs. Mostly we will be using such a “goat” tool named certipy by Oliver Lyak.

We need to know few concepts for better understanding:

In ADCS, the certificate issuance workflow runs quite simply. A user generates a CSR request to get a certificate and sends the request to the ADCS server. The server checks the CSR request, and if everything is fine, it signs the certificate with its own private key and gives it to the client (machine or user). We got a cert!

Screenshot1

In this blog series we will be looking at the ADCS misconfigs. You can reach every ESC misconfig with the following links. (Don’t worry — other ESC misconfigs will be coming soon.)

Abuse Methods

ESC1