dNSHostName attribute to match the dNSHostName of a targeted computer. The attacker principal will then abuse their control over the victim computer to obtain the credentials of the victim computer, or a session as the victim computer, and enroll a certificate as the victim in one of the affected certificate templates. The dNSHostName of the victim will be included in the issued certificate under SAN DNS name. As the certificate template does not have the security extension, the issued certificate will NOT include the SID of the victim computer. DCs with strong certificate binding configuration will require a SID to be present in a certificate used for Kerberos authentication, but the affected DCs with weak certificate binding configuration will not. The affected DCs will split the SAN DNS name into a computer name and a domain name, confirm that the domain name is correct, and use the computer name appended a $ to identify principals with a matching sAMAccountName. At last, the DC issues a Kerberos TGT as the targeted computer to the attacker, which means the attacker now has a session as the targeted computer.
Abuse Info
Windows
Step 1: Remove SPNs includingdNSHostName on victim.
The SPNs of the victim will be automatically updated when you change the dNSHostName. AD will not allow the same SPN entry to be set on two accounts. Therefore, you must remove any SPN on the victim account that includes the victim’s dNSHostName.
Set SPN of the victim computer using PowerView:
dNSHostName of victim computer to targeted computer’s dNSHostName.
Set the dNSHostName of the victim computer using PowerView:
dNSHostName and SPN of victim to the previous values.
To avoid issues in the environment, set the dNSHostName and SPN of the victim computer back to its previous values using PowerView:
Linux
Step 1: Remove SPNs includingdNSHostName on victim.
The SPNs of the victim will be automatically updated when you change the dNSHostName. AD will not allow the same SPN entry to be set on two accounts. Therefore, you must remove any SPN on the victim account that includes the victim’s dNSHostName.
Remove SPN entries with ldapmodify:
dNSHostName of victim computer to targeted computer’s dNSHostName.
Set the dNSHostName of the victim computer using Certipy:
dNSHostName and SPN of victim to the previous values.
To avoid issues in the environment, set the dNSHostName and SPN of the victim computer back to its previous value using Certipy and ldapmodify:
Edge Schema
Source: User, Group, ComputerDestination: Domain
Traversable: Yes