Pass the Certificate - PKINIT
Theory
The Kerberos authentication protocol works with tickets in order to grant access. An ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can only be obtained by validating a first step named "pre-authentication" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast). The pre-authentication can be validated symmetrically (with a DES, RC4, AES128 or AES256 key) or asymmetrically (with certificates). The asymmetrical way of pre-authenticating is called PKINIT.
Pass the Certificate is the fancy name given to the pre-authentication operation relying on a certificate (i.e. key pair) to pass in order to obtain a TGT. This operation is often conducted along shadow credentials, AD CS escalation and UnPAC-the-hash attacks.
Keep in mind a certificate in itself cannot be used for authentication without the knowledge of the private key. A certificate is signed for a specific public key, that was generated along with a private key, which should be used when relying on a certificate for authentication.
The "certificate + private key" pair is usually used in the following manner
PEM certificate + PEM private key
PFX certificate export (which contains the private key) + PFX password (which protects the PFX certificate export)
Practice
If you encounter the errorKDC_ERR_PADATA_TYPE_NOSUPP
when attempting to pass the certificate through PKINIT, this may be an indication that the targeted KDC do not have certificates with the necessary EKUs (Extended Key Usages). Specifically, for a KDC to support PKINIT, its certificates must include the Smart Card Logon
EKU.
However, you can try to pass the certificate using Schannel.
PKINITtools
From UNIX-like systems, Dirk-jan's gettgtpkinit.py from PKINITtools tool to request a TGT (Ticket Granting Ticket) for the target object. That tool supports the use of the certificate in multiple forms.
The ticket obtained can then be used to
authenticate with pass-the-cache
conduct an UnPAC-the-hash attack. This can be done with getnthash.py from PKINITtools.
obtain access to the account's SPN with an S4U2Self. This can be done with gets4uticket.py from PKINITtools.
Certipy
When using Certipy for Pass-the-Certificate, it automatically does UnPAC-the-hash to recover the account's NT hash, in addition to saving the obtained TGT.
Notes that Certipy's commands don't support PFXs with password. The following command can be used to "unprotect" a PFX file.
Evil-WinRm
Evil-WinRM uses the WinRM protocol based on Windows Management Instrumentation (WMI) to give us an interactive shell on a Windows host. Winrm Supports PKINIT, so we can authenticate with a certificate.
Evil WinRM doesn't directly support PFX files and need a PEM certificate and private key. The following commands can be used to convert a PFX file in PEM formats
Last updated