Relay (DNS to HTTP)

Dirk-janarrow-up-right did some cool research in 2022 with an example of how an attacker could capture Kerberos authentication from computers and relay that authentication to the HTTP enrollment endpoint on an AD CS server (ESC8 abuse).

The attack follows these steps:

  1. Attacker runs mitm6 as a way to get clients to authenticate to the attacker-controlled host

    • mitm6 is run with --relay [AD CS hostname], which will specify the AD CS hostname as the authoritative nameserver

  2. The client requests a ST from the KDC for DNS/[AD CS hostname], and sends the ST to the attacker

  3. Attacker relays the ST to the HTTP enrollment endpoint on the AD CS server

circle-info

Relaying from DNS/adcs.domain.com to HTTP/adcs.domain.com is possible because Kerberos validation at the service only requires that the server can decrypt the ticket with its key.

By default, the service does not strictly enforce that the SPN inside the ticket matches the service being accessed.

Exploit

Last updated