Skip to content

Commit f766f49

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 84e2e6b commit f766f49

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

db/modules_metadata_base.json

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24116,19 +24116,21 @@
2411624116
"Spencer McIntyre",
2411724117
"jheysel-r7"
2411824118
],
24119-
"description": "This module allows users to query a LDAP server for vulnerable certificate\n templates and will print these certificates out in a table along with which\n attack they are vulnerable to and the SIDs that can be used to enroll in that\n certificate template.\n\n Additionally the module will also print out a list of known certificate servers\n along with info about which vulnerable certificate templates the certificate server\n allows enrollment in and which SIDs are authorized to use that certificate server to\n perform this enrollment operation.\n\n Currently the module is capable of checking for certificates that are vulnerable to ESC1, ESC2, ESC3, ESC4,\n ESC13, and ESC15. The module is limited to checking for these techniques due to them being identifiable\n remotely from a normal user account by analyzing the objects in LDAP.",
24119+
"description": "This module allows users to query a LDAP server for vulnerable certificate\n templates and will print these certificates out in a table along with which\n attack they are vulnerable to and the SIDs that can be used to enroll in that\n certificate template.\n\n Additionally the module will also print out a list of known certificate servers\n along with info about which vulnerable certificate templates the certificate server\n allows enrollment in and which SIDs are authorized to use that certificate server to\n perform this enrollment operation.\n\n Currently the module is capable of checking for certificates that are vulnerable to ESC1, ESC2, ESC3, ESC4,\n ESC13, and ESC15. The module is limited to checking for these techniques due to them being identifiable\n remotely from a normal user account by analyzing the objects in LDAP.\n\n The module can also check for ESC9, ESC10 and ESC16 but this requires an Administrative WinRM session to be\n established to definitively check for these techniques.",
2412024120
"references": [
2412124121
"URL-https://posts.specterops.io/certified-pre-owned-d95910965cd2",
24122+
"URL-https://research.ifcr.dk/certipy-4-0-esc9-esc10-bloodhound-gui-new-authentication-and-request-methods-and-more-7237d88061f7",
2412224123
"URL-https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53",
24123-
"URL-https://trustedsec.com/blog/ekuwu-not-just-another-ad-cs-esc"
24124+
"URL-https://trustedsec.com/blog/ekuwu-not-just-another-ad-cs-esc",
24125+
"URL-https://github.com/ly4k/Certipy/wiki/06-%E2%80%90-Privilege-Escalation"
2412424126
],
2412524127
"platform": "",
2412624128
"arch": "",
2412724129
"rport": 389,
2412824130
"autofilter_ports": [],
2412924131
"autofilter_services": [],
2413024132
"targets": null,
24131-
"mod_time": "2025-06-17 11:19:09 +0000",
24133+
"mod_time": "2025-07-30 12:13:33 +0000",
2413224134
"path": "/modules/auxiliary/gather/ldap_esc_vulnerable_cert_finder.rb",
2413324135
"is_install_path": true,
2413424136
"ref_name": "gather/ldap_esc_vulnerable_cert_finder",

0 commit comments

Comments
 (0)