certipy-ad
Example vulnerable Template:
CA Name : CA01.test.nl\Test Group
Template Name : IpadEnrollment
Schema Version : 2
Validity Period : 2 years
Renewal Period : 6 weeks
msPKI-Certificate-Name-Flag : ENROLLEE_SUPPLIES_SUBJECT
mspki-enrollment-flag : NONE
Authorized Signatures Required : 0
pkiextendedkeyusage : Client Authentication, IP security IKE intermediate, Server Authentication
mspki-certificate-application-policy : Client Authentication, IP security IKE intermediate, Server Authentication
Permissions
Enrollment Permissions
Enrollment Rights : <UNKNOWN> <SID>-26253
<UNKNOWN> <SID>-512
<UNKNOWN> <SID>-519
NT AUTHORITY\Authenticated UsersS-1-5-11
Object Control Permissions
Owner : <UNKNOWN> <SID>-12575
WriteOwner Principals : <UNKNOWN> <SID>-12575
<UNKNOWN> <SID>-512
<UNKNOWN> <SID>-519
WriteDacl Principals : <UNKNOWN> <SID>-12575
<UNKNOWN> <SID>-512
<UNKNOWN> <SID>-519
WriteProperty Principals : <UNKNOWN> <SID>-12575
<UNKNOWN> <SID>-512
<UNKNOWN> <SID>-519First we import necessary ticket into Kali:
Request .pfx
Use .pfx to obtain NTLM hash
Dump secrets using DA hash:
Last updated