githubEdit

Access controls

Theory

In their research papersarrow-up-right, Will Schroederarrow-up-right and Lee Christensenarrow-up-right identified a set of vectors of domain persistence based on access control misconfigurations (dubbed DPERSIST3).

Active Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This includes Certificate templates, Certificate Authorities, CA server, etc.

In the same research papers, domain escalation techniques abusing misconfigurated access controls were identified dubbed ESC4arrow-up-right, ESC5arrow-up-right and ESC7arrow-up-right).

If an attacker obtains sufficient permissions in a domain, he could modify security descriptors of AD CS components, in order to make them vulnerable to the attacks mentioned in Movement > AD-CS > Access controls.

These modifications can be made with tools like Impacket's (Python) dacledit.pyarrow-up-right or with Add-DomainObjectAclarrow-up-right (PowerViewarrow-up-right module), as explained in Grant rights.

Last updated