Skip to content

Latest commit

 

History

History
56 lines (34 loc) · 1.17 KB

t1130-install-root-certificate.md

File metadata and controls

56 lines (34 loc) · 1.17 KB
description
Defense Evasion

Installing Root Certificate

Execution

Adding a certificate with a native windows binary:

{% code title="attacker@victim" %}

certutil.exe -addstore -f -user Root C:\Users\spot\Downloads\certnew.cer

{% endcode %}

Checking to see the certificate got installed:

Adding the certificate with powershell:

{% code title="attacker@victim" %}

Import-Certificate -FilePath C:\Users\spot\Downloads\certnew.cer -CertStoreLocation Cert:\CurrentUser\Root\

{% endcode %}

Observations

Advanced poweshell logging to the rescue:

Commandline logging:

The CAs get installed to:

Computer\HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates\Root\Certificates\C6B22A75B0633E76C9F21A81F2EE6E991F5C94AE

..so it is worth monitoring registry changes there:

References

{% embed url="https://attack.mitre.org/wiki/Technique/T1130" %}