CA/Template Discovery
netexec ldap -u [username] -p [password] -M adcsldapsearch \
-H ldap://dc.domain.local -D 'user@domain' -w 'password' \
-b 'CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=sccm,DC=lab' \
-s one '(objectClass=pKIEnrollmentService)' \
cn dNSHostNameFinding Vulnerable Templates
Last updated