Skip to content

Commit 7bce403

Browse files
committed
Update module data to improve discoverability
1 parent 88ea9af commit 7bce403

File tree

5 files changed

+21
-7
lines changed

5 files changed

+21
-7
lines changed

documentation/modules/auxiliary/admin/dcerpc/icpr_cert.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ Request certificates via MS-ICPR (Active Directory Certificate Services). Depend
33
template's configuration the resulting certificate can be used for various operations such as authentication.
44
PFX certificate files that are saved are encrypted with a blank password.
55

6+
This module is capable of exploiting ESC1, ESC2, ESC3 and ESC13.
7+
68
## Module usage
79

810
1. From msfconsole

documentation/modules/auxiliary/admin/ldap/ad_cs_cert_template.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,13 @@
1-
## RBCD Exploitation
1+
## AD CS Certificate Template Exploitation
22

33
This module can read, write, update, and delete AD CS certificate templates from a Active Directory Domain Controller.
44

5-
The READ, UPDATE, and DELETE actions will write a copy of the certificate template to disk that can be restored using
6-
the CREATE or UPDATE actions.
5+
The READ, UPDATE, and DELETE actions will write a copy of the certificate template to disk that can be
6+
restored using the CREATE or UPDATE actions. The CREATE and UPDATE actions require a certificate template data
7+
file to be specified to define the attributes. Template data files are provided to create a template that is
8+
vulnerable to ESC1, ESC2, and ESC3.
9+
10+
This module is capable of exploiting ESC4.
711

812
In order for the `auxiliary/admin/ldap/ad_cs_cert_template` module to succeed, the authenticated user must have the
913
necessary permissions to perform the specified action on the target object (the certificate specified in

modules/auxiliary/admin/dcerpc/icpr_cert.rb

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ def initialize(info = {})
2020
Request certificates via MS-ICPR (Active Directory Certificate Services). Depending on the certificate
2121
template's configuration the resulting certificate can be used for various operations such as authentication.
2222
PFX certificate files that are saved are encrypted with a blank password.
23+
24+
This module is capable of exploiting ESC1, ESC2, ESC3 and ESC13.
2325
},
2426
'License' => MSF_LICENSE,
2527
'Author' => [

modules/auxiliary/admin/ldap/ad_cs_cert_template.rb

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,15 @@ def initialize(info = {})
4242
info,
4343
'Name' => 'AD CS Certificate Template Management',
4444
'Description' => %q{
45-
This module can read, write, update, and delete AD CS certificate templates from a Active Directory Domain
45+
This module can create, read, update, and delete AD CS certificate templates from a Active Directory Domain
4646
Controller.
4747
4848
The READ, UPDATE, and DELETE actions will write a copy of the certificate template to disk that can be
49-
restored using the CREATE or UPDATE actions.
49+
restored using the CREATE or UPDATE actions. The CREATE and UPDATE actions require a certificate template data
50+
file to be specified to define the attributes. Template data files are provided to create a template that is
51+
vulnerable to ESC1, ESC2, and ESC3.
52+
53+
This module is capable of exploiting ESC4.
5054
},
5155
'Author' => [
5256
'Will Schroeder', # original idea/research
@@ -69,7 +73,8 @@ def initialize(info = {})
6973
'Notes' => {
7074
'Stability' => [],
7175
'SideEffects' => [CONFIG_CHANGES],
72-
'Reliability' => []
76+
'Reliability' => [],
77+
'AKA' => [ 'Certifry', 'Certipy' ]
7378
}
7479
)
7580
)

modules/auxiliary/gather/ldap_esc_vulnerable_cert_finder.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,8 @@ def initialize(info = {})
4444
'Notes' => {
4545
'Stability' => [CRASH_SAFE],
4646
'SideEffects' => [IOC_IN_LOGS],
47-
'Reliability' => []
47+
'Reliability' => [],
48+
'AKA' => [ 'Certifry', 'Certipy' ]
4849
}
4950
)
5051
)

0 commit comments

Comments
 (0)