@@ -1164,7 +1164,15 @@ function Find-ESC5 {
1164
1164
}
1165
1165
1166
1166
$IssueDetail = ' '
1167
- if ( ($_.objectClass -ne ' pKICertificateTemplate' ) -and ($SID -notmatch $SafeOwners ) ) {
1167
+ $DangerousOwner = $false
1168
+ if ( ($_.objectClass -eq ' computer' ) -and ($SID -match ' -512$' ) ) {
1169
+ $DangerousOwner = $false
1170
+ }
1171
+ elseif ( ($_.objectClass -ne ' pKICertificateTemplate' ) -and ($SID -notmatch $SafeOwners ) ) {
1172
+ $DangerousOwner = $true
1173
+ }
1174
+
1175
+ if ($DangerousOwner ) {
1168
1176
switch ($_.objectClass ) {
1169
1177
container {
1170
1178
$IssueDetail = @"
@@ -1177,7 +1185,8 @@ CA objects, new templates, new OIDs, etc. to create novel escalation paths.
1177
1185
$IssueDetail = @"
1178
1186
This computer is hosting a Certification Authority (CA).
1179
1187
1180
- There is no reason for anyone other than AD Admins to have own CA host objects.
1188
+ There is no reason for anyone other than Enterprise Admins or Domain Admins to
1189
+ own CA host objects.
1181
1190
"@
1182
1191
}
1183
1192
' msPKI-Cert-Template-OID' {
@@ -1197,7 +1206,7 @@ Ownership rights can be used to enable currently disabled templates.
1197
1206
1198
1207
If this prinicpal also has control over a disabled certificate template (aka ESC4),
1199
1208
they could modify the template into an ESC1 template and enable the certificate.
1200
- This ensabled certificate could be use for privilege escalation and persistence.
1209
+ This enabled certificate could be use for privilege escalation and persistence.
1201
1210
"@
1202
1211
}
1203
1212
}
@@ -4381,7 +4390,7 @@ function Invoke-Locksmith {
4381
4390
[System.Management.Automation.PSCredential ]$Credential
4382
4391
)
4383
4392
4384
- $Version = ' 2025.1.14 '
4393
+ $Version = ' 2025.2.22 '
4385
4394
$LogoPart1 = @'
4386
4395
_ _____ _______ _ _ _______ _______ _____ _______ _ _
4387
4396
| | | | |____/ |______ | | | | | |_____|
0 commit comments