dNSHostName Spoofing (Certifried)
CVE-2022-26923
Check
If there's an object SID printed when requesting a certificate based on the User or Machine templates, the AD environment is not vulnerable:
Exploit
Create a new machine account with dNSHostName
containing FQDN of a DC:
Or change dNSHostName
property manually for an already pwned machine account, e.g. via pre2k (will definitely break stuff!):
Request a certificate on behalf of that machine account with spoofed dNSHostName
:
Abuse PKINIT
Authenticate with the obtained certificate and get DC's NT hash via PKINIT:
Abuse RBCD
Authenticate with obtained certificate and configure RBCD on a DC via bloodyAD to allow delegation to the fake machine account:
Clean Up
If dNSHostName
was modified for an existing machine account, roll back the changes:
A list of SPNs to backup can be taken from a BH dump:
About the Fix
Last updated