Shadow Credentials

The Shadow Credentials attack takes advantage of improper permissions on the msDS-KeyCredentialLink attribute, allowing attackers to inject their own public key into the attribute of a target user or computer account.

  • Permissions like GenericWrite or GenericAll are required to modify the msDS-KeyCredentialLink

  • the attacker adds their own public key to the msDS-KeyCredentialLink

  • The attacker creates a certificate in PFX format using the private key associated with the injected public key

  • With the generated certificate, the attacker authenticates to the domain using PKINIT

pywhisker & gettgtpkinit & getnthash

Requesting TGT using cert

certify-ad

Post-Exploitation

Last updated