description |
---|
Defense Evasion |
Adding a certificate with a native windows binary:
{% code title="attacker@victim" %}
certutil.exe -addstore -f -user Root C:\Users\spot\Downloads\certnew.cer
{% endcode %}
Checking to see the certificate got installed:
Adding the certificate with powershell:
{% code title="attacker@victim" %}
Import-Certificate -FilePath C:\Users\spot\Downloads\certnew.cer -CertStoreLocation Cert:\CurrentUser\Root\
{% endcode %}
Advanced poweshell logging to the rescue:
Commandline logging:
The CAs get installed to:
Computer\HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates\Root\Certificates\C6B22A75B0633E76C9F21A81F2EE6E991F5C94AE
..so it is worth monitoring registry changes there:
{% embed url="https://attack.mitre.org/wiki/Technique/T1130" %}