ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

AD Certificate Template Enumeration Activity

Risk Factors

Attack tools facilitate Active Directory (AD) reconnaissance by running scripts to enumerate Certificate Templates. This technique requires an attacker to have domain credentials in an AD environment with AD Certificate Services (AD CS) implemented, which is less common compared to other enumeration techniques. An attacker can exploit a discovered Certificate Template to gain elevated privileges.

Attack Background

AD CS is a Windows server role that acts as a Certificate Authority (CA) for issuing, managing, and revoking certificates. Certificate Templates are the specific rules and settings AD CS follows to determine who receives certificates and what privileges those certificates grant.

Misconfigurations in Certificate Templates enable a user to escalate their privileges. Enumeration techniques help an attacker identify which templates are available and vulnerable for exploitation.

An attacker runs scripts from tools such as Certipy and Metasploit to send an LDAP request with the searchRequest method that queries all template objects, but also includes filters and requests for specific attributes, such as msPKI-Certificate-Name-Flag. This type of request exposes vulnerabilities in the templates. After an attacker successfully enumerates sensitive template details, they can request a certificate to obtain privileged credentials for greater access to the AD domain.

Mitigation Options

Review Certificate Template attributes for appropriate enrollment rights and security settings.

Because securing LDAP servers can be difficult without compromising functionality, monitor and investigate unusual LDAP activity quickly to minimize potential damage.

Associated content

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

External

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections Overview

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access

Blog

MITRE ATT&CK Framework: 4 Questions to Ask NDR Providers about their Coverage

Blog

RevealX™ and the MITRE ATT&CK® Framework

Report
Periodic Table of Use Cases

What else can RevealX do for you?