Basics

ADCS | PrivEsc to Domain Admin

tools

Reconnaissance & Enumeration

certipy find -u [email protected] -p 'horse' -dc-ip 192.168.56.12

This will search the certificate server, and dump all the information needed in three format :

  • bloodhound : a zip ready to import in bloodhound (if you use certipy 4.0 you will have to install the bloodhound gui modified by oliver lyak, if you do not want to use the modified version, you must use the -old-bloodhound option)

  • json : information json formated

  • txt : a textual format

Find vulnerable templates :

certipy find -u [email protected] -p 'horse' -vulnerable -dc-ip 192.168.56.12 -stdout

Last updated

Was this helpful?