Skip to content

Commit 88ba2de

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent f3eefc0 commit 88ba2de

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

db/modules_metadata_base.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6515,7 +6515,7 @@
65156515

65166516
],
65176517
"targets": null,
6518-
"mod_time": "2024-11-18 15:32:08 +0000",
6518+
"mod_time": "2025-01-29 14:25:33 +0000",
65196519
"path": "/modules/auxiliary/admin/kerberos/get_ticket.rb",
65206520
"is_install_path": true,
65216521
"ref_name": "admin/kerberos/get_ticket",
@@ -6802,7 +6802,7 @@
68026802

68036803
],
68046804
"targets": null,
6805-
"mod_time": "2024-10-22 14:41:02 +0000",
6805+
"mod_time": "2025-01-28 17:20:10 +0000",
68066806
"path": "/modules/auxiliary/admin/ldap/ad_cs_cert_template.rb",
68076807
"is_install_path": true,
68086808
"ref_name": "admin/ldap/ad_cs_cert_template",
@@ -24159,7 +24159,7 @@
2415924159
"Spencer McIntyre",
2416024160
"jheysel-r7"
2416124161
],
24162-
"description": "This module allows users to query a LDAP server for vulnerable certificate\n templates and will print these certificates out in a table along with which\n attack they are vulnerable to and the SIDs that can be used to enroll in that\n certificate template.\n\n Additionally the module will also print out a list of known certificate servers\n along with info about which vulnerable certificate templates the certificate server\n allows enrollment in and which SIDs are authorized to use that certificate server to\n perform this enrollment operation.\n\n Currently the module is capable of checking for certificates that are vulnerable to ESC1, ESC2, ESC3, ESC13,\n and ESC15. The module is limited to checking for these techniques due to them being identifiable remotely from\n a normal user account by analyzing the objects in LDAP.",
24162+
"description": "This module allows users to query a LDAP server for vulnerable certificate\n templates and will print these certificates out in a table along with which\n attack they are vulnerable to and the SIDs that can be used to enroll in that\n certificate template.\n\n Additionally the module will also print out a list of known certificate servers\n along with info about which vulnerable certificate templates the certificate server\n allows enrollment in and which SIDs are authorized to use that certificate server to\n perform this enrollment operation.\n\n Currently the module is capable of checking for certificates that are vulnerable to ESC1, ESC2, ESC3, ESC4,\n ESC13, and ESC15. The module is limited to checking for these techniques due to them being identifiable\n remotely from a normal user account by analyzing the objects in LDAP.",
2416324163
"references": [
2416424164
"URL-https://posts.specterops.io/certified-pre-owned-d95910965cd2",
2416524165
"URL-https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53",
@@ -24175,7 +24175,7 @@
2417524175

2417624176
],
2417724177
"targets": null,
24178-
"mod_time": "2025-01-24 07:35:12 +0000",
24178+
"mod_time": "2025-01-31 14:48:57 +0000",
2417924179
"path": "/modules/auxiliary/gather/ldap_esc_vulnerable_cert_finder.rb",
2418024180
"is_install_path": true,
2418124181
"ref_name": "gather/ldap_esc_vulnerable_cert_finder",

0 commit comments

Comments
 (0)