competition-ad-certificate-abuse
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseCompetition AD Certificate Abuse
竞赛AD证书滥用
Use this skill only as a downstream specialization after is already active and has established sandbox assumptions, node ownership, and evidence priorities. If that has not happened yet, return to first.
$ctf-sandbox-orchestrator$ctf-sandbox-orchestratorUse this skill when the decisive identity edge is certificate-based and the hard part is proving how a template or CA policy turns into accepted privilege.
Reply in Simplified Chinese unless the user explicitly requests English.
此技能仅可作为下游专项技能,在已处于激活状态、且已建立沙箱假设、节点归属和证据优先级时使用。如果尚未满足上述条件,请先返回。
$ctf-sandbox-orchestrator$ctf-sandbox-orchestrator当核心身份边界基于证书,且难点在于证明模板或CA策略如何转换为可被接受的权限时,使用此技能。
除非用户明确要求英文,否则请使用简体中文回复。
Quick Start
快速开始
- Identify the CA, template, enrolling principal, and accepting service before diving into every certificate detail.
- Separate template enrollability from cert-based authentication or privilege acceptance.
- Record EKUs, subject or SAN controls, issuance requirements, enrollment rights, and mapping behavior in compact blocks.
- Tie the issued cert to one accepted path: PKINIT, Schannel, LDAPS, WinRM, or another mapped service.
- Reproduce the smallest certificate issuance-to-acceptance chain that yields the decisive privilege.
- 在深入研究每个证书细节之前,先确定CA、模板、申请主体和接受服务。
- 将模板可注册性与基于证书的身份验证或权限接受分离开。
- 以紧凑块的形式记录EKUs、主体或SAN控制、颁发要求、注册权限和映射行为。
- 将已颁发的证书与一条可被接受的路径关联:PKINIT、Schannel、LDAPS、WinRM或其他映射服务。
- 复现可产生核心权限的最短证书颁发-接受链。
Workflow
工作流
1. Map CA And Template Trust
1. 映射CA与模板信任
- Record CA configuration, template name, enrollment permissions, manager approval, authorized signatures, EKUs, subject requirements, and SAN behavior.
- Note whether the path depends on alternate subject names, , DNS names, enrollment agent behavior, or template supersedence.
UPN - Keep principal, template, and issuance policy tied together.
- 记录CA配置、模板名称、注册权限、管理员审批、授权签名、EKUs、主体要求和SAN行为。
- 注意路径是否依赖于可选主体名称、、DNS名称、注册代理行为或模板取代关系。
UPN - 保持主体、模板和颁发策略相互关联。
2. Prove Cert-To-Privilege Acceptance
2. 证明证书到权限的接受逻辑
- Show how the issued certificate is mapped or accepted: PKINIT, smartcard logon, Schannel auth, service mapping, or explicit certificate mapping.
- Record serial, subject, SAN, EKU, validity, and the exact service or domain edge that accepts it.
- Distinguish certificate issuance from the separate step where privilege is actually granted.
- 说明已颁发证书的映射或接受方式:PKINIT、智能卡登录、Schannel认证、服务映射或显式证书映射。
- 记录序列号、主体、SAN、EKU、有效期,以及接受该证书的具体服务或域边界。
- 区分证书颁发和实际授予权限的独立步骤。
3. Reduce To The Decisive Abuse Chain
3. 精简为核心利用链
- Compress the path to the smallest sequence: enrollment right or misconfig -> issued cert -> accepted mapping -> resulting privilege.
- State clearly whether the weakness lives in template config, CA policy, mapping logic, relay path, or enrollment rights.
- If the task is really about delegation or ticket transformation after PKINIT, switch back to the tighter Kerberos skill.
- 将路径压缩为最短序列:注册权限或配置错误 -> 证书颁发 -> 映射被接受 -> 获得对应权限。
- 明确说明漏洞存在于模板配置、CA策略、映射逻辑、中继路径还是注册权限中。
- 如果任务实际上涉及PKINIT后的委派或票据转换,请切换到更针对性的Kerberos技能。
Read This Reference
参考资料
- Load for the AD CS checklist, template checklist, and evidence packaging.
references/ad-certificate-abuse.md
- 加载获取AD CS检查清单、模板检查清单和证据封装规范。
references/ad-certificate-abuse.md
What To Preserve
需要留存的内容
- CA names, template names, rights, EKUs, issuance flags, SAN controls, and mapping details
- Issued certificate fields, serials, subjects, SANs, and the accepting service or logon path
- The smallest reproducible enrollment-to-privilege chain
- CA名称、模板名称、权限、EKUs、颁发标志、SAN控制和映射详情
- 已颁发证书字段、序列号、主体、SAN,以及接受服务或登录路径
- 最短可复现的注册到权限利用链