Open
Conversation
Author
|
@ly4k we have finally finished the wiki entry, which is currently available at: https://github.com/NeffIsBack/esc17-wiki I don't think there is a way to PR to wikis so you probably have to either copy&paste the content or fetch&merge it into your local repository. If you need help with that or anything else hit us up. |
10 tasks
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Earlier this year, @Coontzy1 from TrustedSec published a blog post in which he detailed how an attacker could abuse a misconfigured ADCS template to spoof a WSUS server and perform an NTLM relay attack.
@shaaati and I have extended this research by exploring how to leverage such templates to gain code execution on HTTPS-enabled WSUS clients: https://blog.digitrace.de/2026/01/using-adcs-to-attack-https-enabled-wsus-clients/
In short, with a template that allows to supply the SAN and allows server authentication you can:
This is an extension of the WSUS attack known since 2015 (but so far only worked against plaintext connections).
For the following reasons, we suggest to assign a new ESC number (ESC17) to such templates (allows Server Authentication, allows to supply SAN) in order to systematically identify and track these risks in Active Directory:
If this PR is accepted, the wiki must be updated as well. @ly4k we are happy to help with that.
Everyone, feel free to discuss what you think about this approach. We are open to suggestions.