Index

  1. ESC1 (Enterprise CA Security Configuration) Attack
  2. todo
  3. todo
  4. ESC4 Enterprise CA Security Configuration with Key Escrow) Attacks

ESC1 (Enterprise CA Security Configuration) Attack

Abuse misconfigured certificate templates to allow unauthorized certificate requests that grant attackers higher privileges, facilitating lateral movement and persistence within the network.

Requirements

How to

Attacker as lowpriv user can specify a privileged user in the SAN field and request a certificate:

Untitled

The certificate enables client authentication and the CA creates and signs a certificate using the attacker-supplied SAN. In this way the attacker can become any account in the domain!

Enumeration