ADCS Questions Flashcards

1
Q

What is ESC1

A

A vulnerability where attackers exploit certificate templates allowing requesters to specify a SAN and enroll without approval, leading to domain admin impersonation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does ESC1 enable privilege escalation?

A

By requesting a certificate with a SAN set to a privileged account (e.g., domain admin UPN) and using it for Kerberos authentication (PKINIT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ESC4?

A

Exploiting write permissions on certificate templates to modify them (e.g., enabling SAN, Client Authentication) and enroll as a privileged user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What permissions enable ESC4?

A

Write, WriteDacl, or Owner rights on a template, allowing attackers to reconfigure it maliciously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ESC8?

A

Relaying NTLM authentication to AD CS HTTP endpoints to enroll in certificates and impersonate victims (e.g., Domain Admins).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAN

A

Subject Alternative Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SAN?

A

A field in certificates that allows authentication for multiple identities (e.g., admin@domain.com). Exploited in ESC1/ESC4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EKU

A

Extended Key Usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is EKU?

A

Defines a certificate’s purpose (e.g., Client Authentication for Kerberos). Enabling this in templates allows domain escalation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PKINIT

A

Kerberos extension using certificates (instead of passwords) for authentication. Used to exploit AD CS certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NTLM Relay

A

Forwarding captured NTLM authentication to another service (e.g., AD CS HTTP) to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WriteDacl

A

Permission to modify an object’s security settings (e.g., altering a certificate template’s ACL for ESC4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Certify

A

Tool to enumerate AD CS templates, request certificates, and exploit misconfigurations (ESC1/ESC4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ntlmrelayx

A

Relays NTLM authentication to services like AD CS HTTP endpoints (used in ESC8).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BloodHound

A

Maps AD permissions to find vulnerable templates (e.g., WriteDacl for ESC4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SharpCerti

A

C# tool to request certificates and exploit AD CS vulnerabilities (alternative to Certify).

17
Q

How to mitigate ESC1?

A

Disable SAN editing in templates.

Require manager approval for enrollment.

18
Q

How to mitigate ESC4?

A

Restrict Write/WriteDacl permissions on templates.

Monitor template changes (Event ID 5136).

19
Q

How to mitigate ESC8?

A

Disable HTTP enrollment.

Enforce SMB signing/EPA.

20
Q

General AD CS hardening steps.

A

Audit template permissions.

Restrict Client Authentication EKUs.

Use LDAPS/SMB instead of HTTP.

21
Q

What is a UPN?

A

A UPN (User Principal Name) isa user’s login name formatted like an email address (e.g., john.doe@example.com) in a Microsoft Active Directory.It’s used for logging into domain resources.