Skip to content
CyberOpsSec
CyberOpsSec

Just another cybersecurity site

  • Home
  • Posts
  • Knowledge
    • Auditing
    • Linux Commands
    • Ports & Protocols
    • Scanning
    • Sniffing
    • Syslog
    • Vulnerability/Patch Mgmt
  • About
  • Contact
CyberOpsSec

Just another cybersecurity site

AD CS Vulnerabilities

Admin, January 11, 2024August 11, 2025

If an attacker gets domain user level permissions they could use tools such as certipy-ad or Certify to enumerate AD CS misconfigurations. Vulnerabilities such as ESC 8 can lead to quick domain ownage. Tools such as ntlmrelay can be used to relay authentication over HTTP and request a certificate on behalf of the victim which can be used for impersonation.

There is a great powershell tool called PSPKIAudit which is available to install and run against your environment.

ESC 1

In addition to PSPKIAudit, this powershell command will help detect AD CS templates that are vulnerable to ESC 1. If you have any of these templates issued such as Windows Server Solutions Template or Offline Router you may want to delete them if not used or fix the template. For instance, you could set the Windows Server Solutions template to approval only.

Get-ADObject -LDAPFilter ‘(&(objectclass=pkicertificatetemplate)(!(mspki-enrollment-flag:1.2.840.113556.1.4.804:=2))(|(mspki-ra-signature=0)(!(mspki-ra-signature=*)))(|(pkiextendedkeyusage=1.3.6.1.4.1.311.20.2.2)(pkiextendedkeyusage=1.3.6.1.5.5.7.3.2) (pkiextendedkeyusage=1.3.6.1.5.2.3.4))(mspki-certificate-name-flag:1.2.840.113556.1.4.804:=1))’ -SearchBase ‘CN=Configuration,DC=Domain,DC=com’

ESC 8

If you are running web enrollment in your PKI and are using HTTP on your CertSrv website, Then you’re most likely vulnerable to this. You can fix this by enabling SSL/TLS and or EAP in IIS. You can also change the authentication from NTLM/Negotiate to something else such as Negotiate:Kerberos. Changing the providers may break your web enrollment. Testing would need to be performed after changing the providers to verify.

Proper auditing should be enabled on AD CS

and if you see any of these alerts then you should investigate immediately.

Vulnerabilities

Post navigation

Previous post
Next post

Related Posts

Disable mDNS

March 13, 2024August 11, 2025

Issuing netstat and lsof commands to view UDP 5353 connections/listening ports shows that the avahi-daemon…

Read More

ICMP Timestamp Request Remote Date Disclosure

May 8, 2024August 11, 2025

You may have seen this vulnerability pop in Nessus. In order to remediate this we…

Read More

Nessus False Positive

June 25, 2024August 11, 2025

Plugin ID: 132101Windows Speculative Execution Configuration Check According to MS: KB4072698: Windows Server and Azure…

Read More

Recent Posts

  • MSSQL Auditing
  • BloodHound CE Setup
  • UBI – User Browsing Isolation
  • Rolling KRBTGT Account
  • SentinelOne: Why it’s important to monitor and audit your EPP

Recent Comments

No comments to show.

Archives

  • August 2025
  • June 2025
  • November 2024
  • September 2024
  • June 2024
  • May 2024
  • March 2024
  • January 2024
  • November 2023
  • September 2023

Categories

  • Audit
  • EPP
  • Tools
  • Uncategorized
  • Vulnerabilities
©2025 CyberOpsSec | WordPress Theme by SuperbThemes