You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
I am new to blue teaming activities. I am trying to use certify to work on abusing ADCS service in my lab.
I am using a server for performing all attacks. I am logged into that PC using standard user and trying to gain access to user with local admin rights and then perform other enumeration
I have used whisker and rubeus to get TGT of local admin and used winrs to connect to CMD using that admin on the same server
Now when I am trying to run certify commands like certify cas, find, pkiobjects etc but getting the errors
Same is happening with other tools like Sharpshares etc.
Can someone suggest
The text was updated successfully, but these errors were encountered:
If your last shell is over a winrm then everything that requires creds over the network will not work, winrm use a logon type that does not store creds on memory, some tools enable you to pass -user and -password, certify dont as far as I remember since he uses your current login. What you need to do is import a tgt to your current session using rubeus or RunasCS to get a revshell with creds on memory. (I think is that someone can correct me If I'm wrong)
Hi,
I am new to blue teaming activities. I am trying to use certify to work on abusing ADCS service in my lab.
I am using a server for performing all attacks. I am logged into that PC using standard user and trying to gain access to user with local admin rights and then perform other enumeration
I have used whisker and rubeus to get TGT of local admin and used winrs to connect to CMD using that admin on the same server
Now when I am trying to run certify commands like certify cas, find, pkiobjects etc but getting the errors
Same is happening with other tools like Sharpshares etc.
Can someone suggest
The text was updated successfully, but these errors were encountered: