We regularly challenge and beat Fortune500 defenses. Often times, a decent ADCS honeypot could have stopped us. So we built one.
We are excited to release Certiception, our Active Directory Certificate Services (ADCS) honeypot tool.
Developed by the SRLabs Red Team, Certiception is designed to trap attackers with a realistic and attractive bait that triggers highly relevant alerts. Certiception comes with an extensive deception strategy guide.
Certiception sets up a vulnerable certificate template in your ADCS environment. While the template looks unsuspicious and attractive to attackers, restrictions prevent actual exploitation. Any attempted exploitation fails and triggers a meaningful alert.
In our Red Team and Incident Management engagements we regularly observe that lateral movement and privilege escalation go undetected. If detections trigger at all, they are not reacted to in a timely manner, because false positives are commonplace.
Internal honeypots, also known as canaries or deception technologies, provide a highly effective and cost-efficient method to trigger meaningful alerts when threats bypassed initial defenses:
Despite their potential, we regularly encounter fundamentally ineffective deception setups. To help defenders create more effective honeypots, our slide release for Certiception contains a strategic guide to deception and how to get started.
Active Directory Certificate Services (ADCS) is an ideal location for a honeypot:
Certiception sets up a new Certificate Authority (CA) in your environment and configures an ESC1 honeypot. Extended Audit Logs and SIGMA rules for your SIEM set the foundation for effective and meaningful alerting. Continuous Checks catch any other CA enabling the vulnerable template.
Get Started with Certiception! Certiception is available open source on Github.
For a detailed guide on setting up honeypots and using Certiception, check out our strategic guide and Troopers24 presentation "The Red Teamers’ Guide to Deception".
Balthasar Martin: @BalthasarMartin / @balthasar@infosec.exchange
Niklas van Dornick: @n1v4d0 / @n1v4d0@infosec.exchange