YuutaW 🌸 · @yuuta
292 followers · 1408 posts · Server mastodon.yuuta.moe
FoxDotGIF · @Foxdotgif
107 followers · 60 posts · Server furry.engineer

If anyone else was having nightmares on client certificates using and for certificate enrollment.

If you have an account for your certificate enrollment, it needs permissions to the Airwatch Cloud connector user folder as well after their latest update.

I added the SVC account we use for certificate enrollment to the administrators group of the connector box, and that resolved our client enrollment issues.

#workspaceone #adcs

Last updated 1 year ago

benzogaga33 · @benzogaga33
731 followers · 22411 posts · Server mamot.fr
Michael C. Bazarewsky · @mikebaz
190 followers · 1213 posts · Server mastodon.social

The Locksmith Active Directory (AD) Certificate Services (CS) remediation tool has been updated: github.com/TrimarcJake/Locksmi

New features:
- Support for Restricted Admin Mode. If RAM is detected, Locksmith will ask to be re-run using the -Credential switch.
- If the AD Powershell module is not installed on Win 10/11, Locksmith will attempt to install it for you.
Note: previously only available on server-class OSes.
- New functions for checking user type and elevation status.
- Auto-generated snippets for ownership issues (a subset of ESC4/ESC5).
- Support for non-English Active Directory evironments!

Next planned updates:
- Add individual CA Hosts to $SafeUsers using SIDs.
- Perform additional environment checks before attempting to run.
- Rename modes to something that makes sense.

#iam #identitysecurity #certificateservices #activedirectory #activedirectorycertificateservices #adcs #pki #locksmith #opensource #defensivesecurity #defensivesecuritytooling #pizza

Last updated 2 years ago

Opalsec :verified: · @Opalsec
131 followers · 66 posts · Server infosec.exchange

Happy Monday, folks! It's time to shake off the cobwebs, so strap yourselves in and get your reading glasses out - here's a wrap-up of the week's infosec news, just for you: opalsec.substack.com/p/soc-gou

Australia's mandatory reporting laws for Critical infrastructure operators got its first win last week, with the CISC revealing 47 cyber incidents were reported in the 8 months to December last year. Congrats, but what does that actually mean?

finally twigged to a multi-year compromise of their networks, after users reported odd redirects impacting their website visitors. Turns out they'd likely been owned since at least March 2020, and appear to have failed to evict the attackers at least twice.

Havoc is the latest C2 framework to be thrown in anger, this time against a government target and in a multi-staged delivery chain which featured several evasive measures. Seems like Sliver and Brute Ratel may soon be in good company!

Symantec researchers have unearthed Frebniis - a stealthy IIS backdoor novel for it's hooking of a legitimate feature to covertly intercept attacker tasking.

A number of critical bugs in , , and have been squashed - just make sure you know which ones, and apply those patches!

members are in for a treat, with a new Nim-based implant to play with and the OffensivePipeline tool to help automate obfuscation.

The can look forward to a detailed look at attacks on and how to mitigate it, as well as Hunt recommendations for evilginx2, and an update to Microsoft for Identity to help identify abuse.

As always, there's literally dozens more research articles on threat actor activity and tradecraft that I can't summarise here, so make sure you take a look at this week's issue of SOC Goulash and get yourself up to speed!

opalsec.substack.com/p/soc-gou

#godaddy #fortinet #apple #citrix #redteam #blueteam #esxi #defender #adcs #infosec #cyberattack #hacked #cyber #news #cybernews #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #sliverc2 #bruteratel #criticalinfrastructure

Last updated 2 years ago

Fabian Bader · @fabian_bader
872 followers · 325 posts · Server infosec.exchange

The new alert type "Suspicious certificate usage over protocol ()" detects misuse of certificates in your environment.

For additional information check out the release blog

techcommunity.microsoft.com/t5

#MDI #kerberos #pkinit #ad #adcs #security

Last updated 2 years ago

Hey

Do you administer/secure/have access to a non-English Active Directory + AD Certificate Services environment? I made some updates to Locksmith last week to improve results in non-English ADs, but I don't have one of my own to test with.

If you can test for me, I will buy you a beer/soda/drink of your choice!

#fediverse #locksmith #adcs #activedirectory #certficateservices #iam #pki

Last updated 2 years ago

Swissky :verified: · @swissky
764 followers · 110 posts · Server infosec.exchange

RT @g0h4n_0
📜ADCS module for 🦀is out (v1.1.0)

⚙️ Collect CA and Templates for @ly4k_ BloodHound version
⚙️ Or like collect CA and Templates for official BloodHound version

github.com/OPENCYBER-FR/RustHo

#RustHound #certipy #infosec #pentest #activedirectory #adcs

Last updated 2 years ago

JM ☠️ · @jmamblat
214 followers · 36 posts · Server infosec.exchange
Jake Hildreth :ancomheart: · @horse
164 followers · 124 posts · Server infosec.exchange

Locksmith has been updated: github.com/TrimarcJake/Locksmi

New features:
- Improved on-screen explanation of what the script is doing
- Improved output formatting
- Confirmation now required before the AD CS environment is changed
- If Locksmith changes your environment, a script is created to easily revert those changes.
- Less false positives
- If Active Directory module is not installed, Locksmith will attempt to install it for you.

Next planned updates:
- Strict Mode support
- RDP Restricted Admin support

#iam #identitysecurity #certificateservices #activedirectory #activedirectorycertificateservices #adcs #locksmith #opensource #defensivesecurity #defensivesecuritytooling #pizza

Last updated 2 years ago

Jake Hildreth :ancomheart: · @horse
164 followers · 124 posts · Server infosec.exchange

Hi. I'm Jake. I'm a recovering sysadmin now working in identity security. I'm a husband, dad, wannabe powerlifter, and blue teamer for life.I enjoy figuring out how stuff works by getting my hands dirty. I maintain the Locksmith AD CS remediation assistant github.com/TrimarcJake/Locksmi

Current areas of focus: improving internal tooling, AD CS security, Protected Users group evangelism

#introduction #activedirectory #adcs #identity #identitysecurity #iam #locksmith #certificateservices #blueteam

Last updated 2 years ago

Jim Sykora · @JimSycurity
413 followers · 82 posts · Server infosec.exchange

At Wild West Hackin' Fest this year, my coworker Jake Hildreth gave a talk in the ToolShed track where he released his new Certificate Services tool Locksmith.

Trimarc has posted his slides along with a brief blog on his new tool: hub.trimarcsecurity.com/post/w

Locksmith is PowerShell tooling that:

-Scans your AD CS environment.

-Finds vulnerable configurations & reports on them.

-(PSPKIAudit, Certify, Certipy all already do this stuff.)

-Remediates.

The remediate bit is the really important bit here and something the other tools built around auditing and attacking the AD CS issues and misconfigurations laid out in SpectreOps Certified Pre-owned.

If you want to go straight to the Locksmith code, here you go: github.com/TrimarcJake/Locksmi

Locksmith is under continuous development and will be improving over time.

#activedirectory #adcs #locksmith #pki

Last updated 2 years ago

Who Let The Dogs Out · @ashed
68 followers · 6578 posts · Server mastodon.ml

📒 Enabling ADCS Audit and Fix Bad Configs

Auditing is not enabled by default in AD CS. For some mysterious reason, Microsoft has decided to not enable AD CS auditing OOB.

To find the issue, run this command on every one of your CAs:
certutil -getreg CA\AuditFilter

To enable all auditing, do this:
certutil –setreg CA\AuditFilter 127
net stop certsvc
net start certsvc

You'll also need to enable the Certificate Service advanced auditing subcategories in a GPO linked to the OU containing your CA host objects (Figure 1). Lastly, enforce the advanced auditing subcategories! All of your previous work will be for naught if you don't enforce (Figure 2).

Fix for AD CS Templates with Bad Configs:
github.com/trimarcjake/adcs-sn

#blueteam #recommendations #audit #adcs

Last updated 3 years ago

Who Let The Dogs Out · @ashed
68 followers · 6578 posts · Server mastodon.ml

Abuse AD CS via dNSHostName Spoofing

This blog covers the technical details of CVE-2022-26923. Active Directory Domain Services Elevation of Privilege Vulnerability via AD CS dNSHostName Spoofing.

research.ifcr.dk/certifried-ac

When you have SYSTEM on server/workstation:
gist.github.com/Wh04m1001/355c

#redteam #privesc #adcs #ad

Last updated 3 years ago

Who Let The Dogs Out · @ashed
68 followers · 6578 posts · Server mastodon.ml

*DNSHostName Spoofing combined with KrbRelayUp*

Domain user to domain admin without the requirement for adding/owning previously a computer account. Step-by-step write-up of the attack in a pure Windows environment.

gist.github.com/tothi/f89a3712

#redteam #relay #ldap #privesc #adcs #ad

Last updated 3 years ago