AD Certificate Exploitation focuses on understanding and exploiting misconfigurations in Active Directory Certificate Services (AD CS). The post explains how certificate templates can be vulnerable to attacks, allowing low-privilege users to request certificates impersonating privileged users. Several methods and tools like Certipy-ad, Metasploit, and Certipy.exe are discussed for enumeration and exploitation. The guide also includes mitigation strategies to prevent such vulnerabilities.
Table of contents
Table of ContentActive Directory Certificate Services (AD CS) – Certificate FlowUnderstanding Enrollment Rights MisconfigurationPrerequisitesLab SetupEnumeration and Exploitation MethodsMitigation StrategiesSort: