From Misconfigured Certificate Template to Domain Admin
This is a quick lab to familiarize with ECS1 privilege escalation technique, that illustrates how it's possible to elevate from a regular user to domain administrator in a Windows Domain by abusing over-permissioned Active Directory Certificate Services (ADCS) certificate templates.

Once in an AD environment, we can find vulnerable certificate templates by using Certify, a tool released by SpecterOps as part of their research mentioned above:
certify.exe find /vulnerable
Below shows a snippet of the redacted output from Certify, that provides information about a vulnerable certificate:
Vulnerable certificate template identified by Certify
In the above screenshot, note the following 3 key pieces of information, that tell us that the certificate template is vulnerable and can be abused for privilege escalation from regular user to domain administrator:
  • msPKI-Certificates-Name-Flag: ENROLLEE_SUPPLIES_SUBJECT field field, which indicates that the user, who is requesting a new certificate based on this certificate template, can request the certificate for another user, meaning any user, including domain administrator user. Below shows the same certificate template setting via GUI when inspecting certificate templates via certsrv.msc:
  • PkiExtendedKeyUsage: Client Authentication, which indicates that the certificate that will be generated based on this certificate template can be used to authenticate to computers in Active Directory. Below shows the same setting via GUI when inspecting certificate templates via certsrv.msc:
  • Enrollment Rights: NT Authority\Authenticated Users, which indicates that any authenticated user in the Active Directory is allowed to request new certificates to be generated based on this certificate template. Below shows the same setting via GUI when inspecting certificate templates via certsrv.msc:

Once the vulnerable certificate template has been identified, we can request a new certificate on behalf of a domain administator using Certify by specifying the following parameters:
  • /ca - speciffies the Certificate Authority server we're sending the request to;
  • /template - specifies the certificate template that should be used for generating the new certificate;
  • /altname - specifies the AD user for which the new certificate should be generated.
certify.exe request /ca:<$certificateAuthorityHost> /template:<$vulnerableCertificateTemplateName> /altname:<$adUserToImpersonate>
Below shows that the certificate in PEM format has been issued successfully:
New certificate was issued off of the vulnerable certificate template

As mentioned above, the certificate we just retrieved is in a PEM format.
To use it with a tool like Rubeus to request a Kerberos Ticket Granting Ticket (TGT) for the user for which we minted the certificate, we need to convert the certificate to PFX format.
To do this, copy the certificate content printed out by Rubeus and paste it to a file called cert.pem.
Then, convert it to cert.pfx with Open SSL (in Linux) like so:
openssl pkcs12 -in cert.pem -keyex -CSP "Microsoft Enhanced Cryptographic Provider v1.0" -export -out cert.pfx

Once we have the certificate in cert.pfx, we can request a Kerberos TGT for the user for which we minted the new certificate:
Rubeus.exe asktgt /user:<$adUserToImpersonate> /certificate:cert.pfx /ptt
Below shows that a new TGT for the target user (Domain Admin in our case) using Rubeus was requested and injected in to the current logon session (because of the /ptt):
Using rubeus to request a TGT for a user for which we minted the certificate
At this point, we can test if we elevated our privileges to domain administrator by listing the administrative c$ share on a server that we don't normally have local administrator privileges on:
Listing a C$ share to confirm administrator access on a server

This is a bonus section that shows how we can request a new certificate for a targeted user without Rubeus, but with a Certificate Signing Request (CSR) file crafted manually and later submitted to Active Directory Certificate Services self-service web portal.

Create a new file cert.cnf with the following contents (modify fields as deemed appropriate):
[ req ]
default_bits = 2048
distinguished_name = req_distinguished_name
req_extensions = req_ext
[ req_distinguished_name ]
countryName = GB
stateOrProvinceName = State or Province Name (full name)
localityName = Locality Name (eg, city)
organizationName = Organization Name (eg, company)
commonName = Common Name (e.g. server FQDN or YOUR name)
[ req_ext ]
subjectAltName = otherName:;UTF8:$adUserToImpersonate
The most important is line 12, which defines the subjectAltName field, which is a samaccountname of the user in Active Directory, which we want to ultimately impersonate (i.e. domain administrator) for which we will be requesting the certificate. Samaccountname value in this file is defined in the variable $adUserToImpersonate - you'd need to change it to the administrator's samaacountname you want to impersonate.
Once the cert.cnf file is ready, generate the actual Certificate Signing Request with openssl (in Linux):
openssl req -out cert-request.csr -newkey rsa:2048 -nodes -keyout key.key -config cert.cnf
Below shows how a base64 encoded Certificate Signing Request file cert-request.csr was created:
Certificate Signing Request being generated with open ssl
Now, copy the contents of the cert-request.csr as we will need it in the last step of this process as described below.

Navigate to https://$adcs/certsrv, where $adcs is the Active Directory Certificate Services host and click Request a certificate:
Requesting certificates via ADCS web self service portal
Click advanced certificate request:
Finally, select the vulnerable certificate template you want to base your new rogue certificate on, paste the contents of the cert-request.csr into the request field and hit Submit to retrieve the new certificate for your target user:
Portal for submitting advanced certificate request
Copy link
On this page
Finding Vulnerable Certificate Templates
Requesting Certificate with Certify
Converting PEM to PFX
Requesting TGT with Certificate
Bonus: Requesting Certificate Manually
Crafting Certificate Signing Request File
Requesting Certificate via CertSrv Web Portal