Domain Persistence Techniques
Domain persistence techniques represent the most powerful forms of persistence in Active Directory environments. These techniques leverage compromised Certificate Authority infrastructure to establish unrestricted access that persists across password changes, account modifications, and standard remediation efforts.DPERSIST1 - Forging Certificates with Stolen CA
Extend one-time privileged access to a CA server into unrestricted privileged access across the entire environment by extracting and using the CA signing certificate.
DPERSIST2 - Trusting Rogue CA Certificates
Install a rogue Certificate Authority certificate in the domain to enable arbitrary certificate creation and authentication.
DPERSIST3 - Malicious Misconfiguration
Establish persistence through deliberate misconfigurations of certificate templates and CA settings.
Key Concepts
Certificate Authority (CA) Infrastructure
Certificate Authority (CA) Infrastructure
Certificate Signing
Certificate Signing
The CA’s private key is used to sign certificates, making them trusted by all domain members. Access to this private key allows attackers to forge certificates that appear legitimate to the entire Active Directory environment.
Golden Certificates
Golden Certificates
Similar to Golden Tickets in Kerberos attacks, “Golden Certificates” are forged certificates created using compromised CA infrastructure that provide unrestricted authentication capabilities.
Tier 0 Assets
Tier 0 Assets
Certificate Authorities should be treated as Tier 0 assets in the Active Directory administrative tier model, as compromise provides domain-wide administrative access.
Prerequisites
- Administrative access to Certificate Authority servers
- Understanding of PKI infrastructure and certificate management
- Knowledge of Active Directory trust relationships
- Appropriate authorization for destructive testing activities
Attack Impact
Domain persistence through compromised CA infrastructure provides:- Unrestricted Authentication: Create certificates for any user or computer account
- Stealth: Certificate-based authentication appears legitimate in logs
- Persistence: Survives password resets and account modifications
- Privilege Escalation: Access to any account including Domain Admins
- Lateral Movement: Authenticate to any system in the domain
Detection and Mitigation
Organizations should implement comprehensive monitoring for:Certificate Authority Security
- Unusual certificate issuance patterns
- Unexpected certificate requests for high-privilege accounts
- CA configuration changes and administrative actions
- Certificate usage from unexpected sources or locations
- Regular auditing of CA private key security
Infrastructure Protection
- Treat CA servers as Tier 0 assets with appropriate security controls
- Implement multi-person authorization for CA operations
- Regular backup and secure storage of CA private keys
- Network segmentation and monitoring of CA infrastructure
- Strong access controls and privileged access management
Recovery Considerations
Next Steps
Select a specific domain persistence technique from the list above to learn detailed implementation steps and attack methodologies. Remember that these techniques should only be used in authorized testing scenarios.