Domain Persistence - Golden Certificate

preview_player
Показать описание
Retrieving the CA certificate could allow a threat actor to forge and sign certificates for any domain user on the domain including domain machine accounts for domain persistence. The most critical machine account is the the one the belongs to the Domain Controller.

The forged certificate can then be used to request a Kerberos ticket from the KDC and utilize this ticket with pass the ticket on any host.

Using the DCSync technique the NTLM hash of the domain administrator can be retrieved which can be used with pass the hash to establish a session with the domain controller or via WMI.

Рекомендации по теме
Комментарии
Автор

Very interesting techniques and approaches to modern day securities.

patricearseneault
Автор

Sorry to bother you i tried to compile the forgecert.exe project usin the SLN file, no matter what .NET framework i used (2.0 to 4.8.1), and settings i can't build it neither DEBUG nor BUILD in VS, no error in the project very hard to troubleshoot . thanks in advance

SALTINBANK