πPass the Certificate (ESC8 & ADCS)
π― Overview
π PKINIT Authentication Architecture
Public Key Cryptography for Initial Authentication
Certificate Authentication Flow
Attack Prerequisites
ποΈ ESC8 - NTLM Relay to ADCS HTTP Endpoint
ESC8 Attack Overview
Attack Architecture
π ESC8 Attack Execution
Phase 1: Environment Setup
Required Tools Installation
Network Reconnaissance
Phase 2: NTLM Relay Attack Setup
Configure ntlmrelayx Listener
Phase 3: Authentication Coercion
Printer Bug Exploitation
Expected Relay Results
π§ OpenSSL Troubleshooting (Critical)
Common PKCS12 Generation Error
Package Conflict Issues
Fix Method 1: Downgrade pyOpenSSL
Fix Method 2: Ubuntu Package Method (Tested Working)
Fix Method 2.5: Force Installation (If dpkg errors)
Fix Method 3: Virtual Environment
Common Troubleshooting Scenarios
Port Already in Use Error
Printerbug RPC Errors
ntlmrelayx Hanging on "Getting certificate..."
π« PKINITtools Certificate Processing
Environment Setup
Kerberos Configuration
TGT Generation from Certificate
π DCSync Attack with Machine Account
Machine Account Privileges
Execute DCSync
Full Domain Dump (Optional)
π Administrative Access via Pass-the-Hash
Evil-WinRM Connection
Post-Exploitation
π― HTB Academy Lab Walkthrough
Lab Environment
Step-by-Step Execution
1. ESC8 NTLM Relay Setup
2. Authentication Coercion
3. PKINITtools Setup
4. DCSync Administrator
5. Administrator Access
Validation and Verification
Confirm Certificate Generation
Validate TGT Generation
Confirm DCSync Success
π‘οΈ Defense and Detection
Attack Detection
Prevention Strategies
Monitoring Queries
π‘ Key Takeaways
π Alternative Attack Vectors
Shadow Credentials
Other ESC Techniques
π Quick Reference - ESC8 Attack Chain
Complete Attack Commands
Emergency OpenSSL Fix
π― HTB Academy Answer Key
Last updated