• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Certsync Activity

Risk Factors

Certsync is an attack tool that enables attackers to easily compromise AD environments. To successfully run Certsync, an attacker must have internal network access and the Active Directory (AD) environment must have implemented AD Certificate Services (AD CS). A successful exploit can lead to stolen credentials and further attacks on your network.

Kill Chain

Exploitation

Risk Score

83

Detection diagram
Next in Exploitation: Cisco CDP Exploit Attempt - [Multiple CVEs]

Attack Background

After a device has been compromised, an attacker can run Certsync to query LDAP to retrieve a set of users in the Active Directory domain and locate the AD CS server. Certsync creates a service on the AD CS server by sending a Microsoft remote procedure call (MS-RPC) request and receiving an MS-RPC response, which grants the attacker access to the certificate server’s private key. Certsync then remotely copies the private key and forges a new authentication certificate for each enumerated user. The attacker can perform the UnPAC-the-Hash technique to steal NTLM hashes and perform additional attacks, such as pass-the-hash, to access services and devices.

Mitigation Options

Secure certificate authorities (CA)

Secure certificates and private keys

MITRE ATT&CK ID

What else can RevealX do for you?