Certipy
PSPKI
Certipy | PSPKI | |
---|---|---|
9 | 4 | |
2,145 | 363 | |
- | 1.7% | |
4.3 | 7.8 | |
8 days ago | 3 months ago | |
Python | PowerShell | |
MIT License | Microsoft Public License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Certipy
-
Pentester PSA: Check your Active Directory Certificate Services (AD CS) For Vulnerabilities
I definitely recommend running Certipy or Certify (compiled binary) to see if you can identify any vulnerabilities in your environment. As far as I know, this stuff won't come up on a Nessus scan. I know when I was a sysadmin I set this up insecurely (has now been fixed). However, AD CS is easy to set up ADCS knowing some of the security implications of the configurations.
-
What recognition methods for privilege escalation in Windows do you use??
I have found something on how to consult the certification templates, first we access "https://github.com/ly4k/Certipy/blob/main/customqueries.json" . We copy the content in raw, we go to /root/.config/Bloodhound/ and copy the content in "customqueries.json" , now when we open Bloodhound we will see a section dedicated to certificate templates. Thank you all, I hope that what I share will help you for a more advanced use of BloodHound, once we have this, with Certipy ( pip3 install certipy-ad ), we download the information and export it to bloodhound
- Certificate tracking suggestions?
- Certipy: Ad Certificate Services (AD CS) misconfig enumeration and abuse
- GitHub - ollypwn/Certipy: Python implementation for Active Directory certificate abuse
- Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).
- RT @ollypwn: Python implementation for AD CS abuse. Find, request, and authenticate your way to Domain Admin - or try your luck with "auto"…
- Certipy: Python implementation for Active Directory certificate abuse
- Active Directory Certificate Services to Domain Admin
PSPKI
-
AD CS management tools
For my scope the PS module is enough. https://github.com/PKISolutions/PSPKI
-
Another user running my script and credential switch is not working
That line does not support the credential switch. PSPKI module Git
- Automating the creation of new CA certificate templates
-
Want to improve my automated certificate creation script with some additions. Help requested.
This is my automated certificate creation script. I have it tied to registry key so shift+right-click in a directory will launch and admin PS window in the directory and start the script. Use it all you want but I am looking for some specific ways to improve it. It uses the PSPKI module.
What are some alternatives?
Certify - Active Directory certificate abuse.
AutomatedLab - AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 2022, some Linux distributions and various products like AD, Exchange, PKI, IIS, etc.
RustHound - Active Directory data collector for BloodHound written in Rust. 🦀
awesome-pki - A collection of articles, manuals, research papers, blogs, videos and software somehow related to the Public Key Cryptography (PKI).
Powershell_CICD_repository - This tool greatly simplifies Windows administrator life by automating the whole scripting content lifecycle. So the boring stuff like backuping, syntax checking, code formatting, content distribution or deletion will be automated and only thing left will be the code writing :)