

- #Skedaddle skidoodle your serial number
- #Skedaddle skidoodle your code
- #Skedaddle skidoodle your windows

#Skedaddle skidoodle your code
Code Signing (OID 1.3.6.1.5.5.7.3.3) - The certificate is for signing executable code.Also known as Enhanced Key Usage in Microsoft parlance. Extended Key Usages (EKUs) - Object identifiers (OIDs) that describe how the certificate will be used.Basic Constraints - Identifies if the certificate is a CA or an end entity, and if there are any constraints when using the certificate.SubjectAlternativeName - Defines one or more alternate names that the Subject may go by.Issuer - Identifies who issued the certificate (commonly a CA).
#Skedaddle skidoodle your serial number

We will mainly (and maybe only) focus on the escalation ones in this blog post. They split the attacks into certain groups, which are: Theft, Persistence, Escalation and Domain Persistence. a PowerShell script or executable.ĭuring their research, Will and Lee stumbled upon a lot of possible ways to abuse ADCS, and have the Certificate Authority do things like issue certs for other users to us, relay a Domain Controller’s authentication to the cert enrollment endpoint, so we could “become” a Domain Controller, and so on. It’s Microsoft’s Public Key Infrastructure implementation for AD, or if you are as dumb as me, the service that introduces and handles certificates to your Active Directory.Ĭertificates can be used to authenticate users and computers, proof validity of a website (you know the little thingy in your browsers searchbar, where it warns you when the cert is invalid) or signing, e.g. During my pentests, I have not seen one environment, where ADCS was not installed and in use.
#Skedaddle skidoodle your windows
The Active Directory Certificate Service(s) is one of the 5 main Active Directory services from Microsoft, included (or at least installable) since Windows Server 2008 -> Microsoft. If you are just here to pwn stuff, you can directly jump to your desired section: It is the research from the SpecterOps guys Will Schroeder and Lee Christensen in the field of ADCS abuses and their mitigations. If you have not already done so, go and read the fundamental work which this blog relies on: Certified Pre-Owned. Prepare yourself for a shitload of pictures, memes, usefull as well as meaningless information. Same is true if you live on the blue side, as you can proactively mitigate issues an earn some bonus points with your boss, maybe. If you want to leave an impression on your next pentest, this one’s for you, as Microsoft’s PKI implementation is widely used but little understood (well at least in terms of security). We are going to explore the wonderful world of Active Directory Certificate Services, aka ADCS. My dear Bagginses and Boffins, Tooks and Brandybucks, Grubbs, Chubbs, Hornblowers, Bolgers, Bracegirdles and Proudfoots - it is time for some new shit.
