Beyond
This is the beyond page that an additional post enumeration and assessment are conducted as SYSTEM after compromising the target system and domain.
ps c:\tmp> net user administrator Qwer1234
The command completed successfully.
Password reset for the administrator
user
ps c:\tmp> reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
The operation completed successfully.
ps c:\tmp> netsh firewall add portopening TCP 3389 "Remote Desktop"
important: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .
Ok.
Enabling RDP
┌──(kali㉿kali)-[~/archive/htb/labs/cerberus]
└─$ xfreerdp /u:administrator /p:Qwer1234 /v:$IP /cert:ignore /dynamic-resolution /tls-seclevel:0
RDP session established
Firewall
Block Ports
Block Ports
This entry was blocking all the ports
Scheduled Tasks
Start-Hyper-V
\Start-Hyper-V
ps c:\Users\Administrator> schtasks /QUERY /TN \Start-Hyper-V /V /FO LIST
folder: \
hostname: DC
taskname: \Start-Hyper-V
next run time: N/A
status: Ready
logon mode: Interactive/Background
last run time: 1/18/2024 3:36:56 AM
last result: 0
author: CERBERUS\Administrator
task to run: powershell -File C:\Users\Administrator\Documents\start_hyper_v.ps1
start in: N/A
comment: N/A
scheduled task state: Enabled
idle time: Disabled
power management: Stop On Battery Mode, No Start On Batteries
run as user: SYSTEM
delete task if not rescheduled: Disabled
stop task if runs x hours and x mins: 72:00:00
schedule: Scheduling data is not available in this format.
schedule type: At system start up
start time: N/A
start date: N/A
end date: N/A
days: N/A
months: N/A
repeat: Every: N/A
repeat: Until: Time: N/A
repeat: Until: Duration: N/A
repeat: Stop If Still Running: N/A
c:\Users\Administrator\Documents\start_hyper_v.ps1
start_hyper_v.ps1
PS C:\Users\Administrator> cat C:\Users\Administrator\Documents\start_hyper_v.ps1
$vm_name = "Web"
Set-VMProcessor $vm_name -CompatibilityForMigrationEnabled $true
Start-VM -name $vm_name
Domain Objects
ADCS
┌──(kali㉿kali)-[~/archive/htb/labs/cerberus]
└─$ certipy find -enabled -target dc.cerberus.local -u administrator -p 'Qwer1234' -dc-ip $IP -dns-tcp -ns $IP -stdout
Certipy v4.7.0 - by Oliver Lyak (ly4k)
[*] Finding certificate templates
[*] Found 35 certificate templates
[*] Finding certificate authorities
[*] Found 1 certificate authority
[*] Found 13 enabled certificate templates
[*] Trying to get CA configuration for 'cerberus-DC-CA' via CSRA
[!] Got error while trying to get CA configuration for 'cerberus-DC-CA' via CSRA: Could not connect: [Errno 111] Connection refused
[*] Trying to get CA configuration for 'cerberus-DC-CA' via RRP
[!] Got error while trying to get CA configuration for 'cerberus-DC-CA' via RRP: [Errno Connection error (172.16.22.1:445)] timed out
[!] Failed to get CA configuration for 'cerberus-DC-CA'
[*] Enumeration output:
Certificate Authorities
0
CA Name : cerberus-DC-CA
DNS Name : DC.cerberus.local
Certificate Subject : CN=cerberus-DC-CA, DC=cerberus, DC=local
Certificate Serial Number : 3AA38A122C6369984587D5A08B621888
Certificate Validity Start : 2023-01-30 11:08:36+00:00
Certificate Validity End : 2123-01-30 11:18:33+00:00
Web Enrollment : Disabled
User Specified SAN : Unknown
Request Disposition : Unknown
Enforce Encryption for Requests : Unknown
Certificate Templates
0
Template Name : WebServerAD
Display Name : Web Server AD
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : False
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : True
Certificate Name Flag : EnrolleeSuppliesSubject
Private Key Flag : ExportableKey
Extended Key Usage : Server Authentication
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 10 years
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\DC
CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Object Control Permissions
Owner : CERBERUS.LOCAL\Administrator
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
CERBERUS.LOCAL\Administrator
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
CERBERUS.LOCAL\Administrator
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
CERBERUS.LOCAL\Administrator
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Administrator
1
Template Name : CA-Users
Display Name : CA-Users
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : True
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireSpn
SubjectAltRequireUpn
SubjectAltRequireEmail
SubjectRequireEmail
SubjectRequireDirectoryPath
Enrollment Flag : IncludeSymmetricAlgorithms
PublishToDs
AutoEnrollment
Private Key Flag : ExportableKey
UseLegacyProvider
Extended Key Usage : Encrypting File System
Secure Email
Client Authentication
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 1 year
Renewal Period : 45990 hours
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Administrator
CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Domain Users
CERBERUS.LOCAL\Enterprise Admins
Object Control Permissions
Owner : CERBERUS.LOCAL\Administrator
Write Owner Principals : CERBERUS.LOCAL\Administrator
CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Administrator
CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Administrator
CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Administrator
2
Template Name : KerberosAuthentication
Display Name : Kerberos Authentication
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : True
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireDomainDns
SubjectAltRequireDns
Enrollment Flag : AutoEnrollment
Extended Key Usage : Client Authentication
Server Authentication
Smart Card Logon
KDC Authentication
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 1 year
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Enterprise Read-only Domain Controllers
CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Domain Controllers
CERBERUS.LOCAL\Enterprise Admins
CERBERUS.LOCAL\Enterprise Domain Controllers
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
3
Template Name : DirectoryEmailReplication
Display Name : Directory Email Replication
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : False
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireDirectoryGuid
SubjectAltRequireDns
Enrollment Flag : IncludeSymmetricAlgorithms
PublishToDs
AutoEnrollment
Extended Key Usage : Directory Service Email Replication
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 1 year
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Enterprise Read-only Domain Controllers
CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Domain Controllers
CERBERUS.LOCAL\Enterprise Admins
CERBERUS.LOCAL\Enterprise Domain Controllers
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
4
Template Name : DomainControllerAuthentication
Display Name : Domain Controller Authentication
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : True
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireDns
Enrollment Flag : AutoEnrollment
Extended Key Usage : Client Authentication
Server Authentication
Smart Card Logon
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 1 year
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Enterprise Read-only Domain Controllers
CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Domain Controllers
CERBERUS.LOCAL\Enterprise Admins
CERBERUS.LOCAL\Enterprise Domain Controllers
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
5
Template Name : SubCA
Display Name : Subordinate Certification Authority
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : True
Enrollment Agent : True
Any Purpose : True
Enrollee Supplies Subject : True
Certificate Name Flag : EnrolleeSuppliesSubject
Private Key Flag : ExportableKey
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 5 years
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC1 : 'CERBERUS.LOCAL\\Domain Admins' and 'CERBERUS.LOCAL\\Enterprise Admins' can enroll, enrollee supplies subject and template allows client authentication
ESC2 : 'CERBERUS.LOCAL\\Domain Admins' and 'CERBERUS.LOCAL\\Enterprise Admins' can enroll and template can be used for any purpose
ESC3 : 'CERBERUS.LOCAL\\Domain Admins' and 'CERBERUS.LOCAL\\Enterprise Admins' can enroll and template has Certificate Request Agent EKU set
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
6
Template Name : WebServer
Display Name : Web Server
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : False
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : True
Certificate Name Flag : EnrolleeSuppliesSubject
Extended Key Usage : Server Authentication
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 2 years
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
7
Template Name : DomainController
Display Name : Domain Controller
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : True
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireDirectoryGuid
SubjectAltRequireDns
SubjectRequireDnsAsCn
Enrollment Flag : IncludeSymmetricAlgorithms
PublishToDs
AutoEnrollment
Extended Key Usage : Client Authentication
Server Authentication
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 1 year
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Enterprise Read-only Domain Controllers
CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Domain Controllers
CERBERUS.LOCAL\Enterprise Admins
CERBERUS.LOCAL\Enterprise Domain Controllers
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
8
Template Name : Machine
Display Name : Computer
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : True
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireDns
SubjectRequireDnsAsCn
Enrollment Flag : AutoEnrollment
Extended Key Usage : Client Authentication
Server Authentication
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 1 year
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Domain Computers
CERBERUS.LOCAL\Enterprise Admins
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
9
Template Name : EFSRecovery
Display Name : EFS Recovery Agent
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : False
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireUpn
SubjectRequireDirectoryPath
Enrollment Flag : IncludeSymmetricAlgorithms
AutoEnrollment
Private Key Flag : ExportableKey
Extended Key Usage : File Recovery
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 5 years
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
10
Template Name : Administrator
Display Name : Administrator
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : True
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireUpn
SubjectAltRequireEmail
SubjectRequireEmail
SubjectRequireDirectoryPath
Enrollment Flag : IncludeSymmetricAlgorithms
PublishToDs
AutoEnrollment
Private Key Flag : ExportableKey
Extended Key Usage : Microsoft Trust List Signing
Encrypting File System
Secure Email
Client Authentication
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 1 year
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
11
Template Name : EFS
Display Name : Basic EFS
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : False
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireUpn
SubjectRequireDirectoryPath
Enrollment Flag : IncludeSymmetricAlgorithms
PublishToDs
AutoEnrollment
Private Key Flag : ExportableKey
Extended Key Usage : Encrypting File System
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 1 year
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Domain Users
CERBERUS.LOCAL\Enterprise Admins
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
12
Template Name : User
Display Name : User
Certificate Authorities : cerberus-DC-CA
Enabled : True
Client Authentication : True
Enrollment Agent : False
Any Purpose : False
Enrollee Supplies Subject : False
Certificate Name Flag : SubjectAltRequireUpn
SubjectAltRequireEmail
SubjectRequireEmail
SubjectRequireDirectoryPath
Enrollment Flag : IncludeSymmetricAlgorithms
PublishToDs
AutoEnrollment
Private Key Flag : ExportableKey
Extended Key Usage : Encrypting File System
Secure Email
Client Authentication
Requires Manager Approval : False
Requires Key Archival : False
Authorized Signatures Required : 0
Validity Period : 1 year
Renewal Period : 6 weeks
Minimum RSA Key Length : 2048
Permissions
Enrollment Permissions
Enrollment Rights : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Domain Users
CERBERUS.LOCAL\Enterprise Admins
Object Control Permissions
Owner : CERBERUS.LOCAL\Enterprise Admins
Write Owner Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Dacl Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
Write Property Principals : CERBERUS.LOCAL\Domain Admins
CERBERUS.LOCAL\Enterprise Admins
[!] Vulnerabilities
ESC4 : Template is owned by CERBERUS.LOCAL\Enterprise Admins
DNS
??
SMB
CertEnroll
CertEnroll
c:\Windows\system32\CertSrv\CertEnroll
IIS
CertEnroll
also shared over SMB
CertSrv
Hyper-V
Web
Web
icinga.cerberus.local
Cron
root@icinga:/dev/shm# crontab -l | grep -v '^#' crontab -l | grep -v '^#'
crontab -l | grep -v '^#'
*/10 * * * * cp /root/cleanup/resources.ini /etc/icingaweb2/resources.ini
*/10 * * * * cp /root/cleanup/config.ini /etc/icingaweb2/config.ini
*/10 * * * * cp /root/cleanup/roles.ini /etc/icingaweb2/roles.ini
*/10 * * * * rm /etc/icingaweb2/ssh/*
Web
root@icinga:/etc/apache2/sites-enabled# cat 000* | grep -v '^#'
cat 000* | grep -v '^#'
<virtualhost *:80>
# The ServerName directive sets the request scheme, hostname and port that
# the server uses to identify itself. This is used when creating
# redirection URLs. In the context of virtual hosts, the ServerName
# specifies what hostname must appear in the request's host: header to
# match this virtual host. For the default virtual host (this file) this
# value is not decisive as it is used as a last resort host regardless.
# However, you must set it for any further virtual host explicitly.
#ServerName www.example.com
ServerAdmin webmaster@localhost
DocumentRoot /var/www/html
# available loglevels: trace8, ..., trace1, debug, info, notice, warn,
# error, crit, alert, emerg.
# It is also possible to configure the loglevel for particular
# modules, e.g.
#loglevel info ssl:warn
ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined
# For most configuration files from conf-available/, which are
# enabled or disabled at a global level, it is possible to
# include a line for only one particular virtual host. For example the
# following line enables the CGI configuration for this host only
# after it has been globally disabled with "a2disconf".
#Include conf-available/serve-cgi-bin.conf
</VirtualHost>
root@icinga:/etc/apache2# curl http://localhost:80/ -i
HTTP/1.1 302 Found
date: Thu, 18 Jan 2024 17:04:19 GMT
server: Apache/2.4.52 (Ubuntu)
location: http://icinga.cerberus.local:8080/icingaweb2
content-length: 0
content-type: text/html; charset=UTF-8
root@icinga:/etc/apache2# cat /var/www/html/index.php
<?php
header("location: http://icinga.cerberus.local:8080/icingaweb2");
?>
ADSelfService Plus
Since SSO is already configured..
This is just the client access. NOT ADMIN for ADSelfService Plus
This is what I need
PS C:\Program Files (x86)\ManageEngine\ADSelfService Plus\bin> .\resetADSSPPassword.bat
[...REDACTED...]
Do you want to disenroll MFA for default admin (Y/N) ?
Y
[...REDACTED...]
Password Changed to 'admin'.
Boom
Configs
SSO Config
IdP
maybe “adfs” is as in AD Federation Service
SP
ADFS
There it was in the list
Here it is
Attribute Stores
AD
Authentication Methods
primary
mfa
Certificates
Service Communications
Token-decrypting
Token-signing
Claim Descriptions
Device Registration
Not configured
Endpoints
This one’s for SAML
Scope Descriptions
Web Application Proxy
Not configured
Access Control Policies
ADSelfService is listed here
Relying Part Trusts
ADSelfService is listed here
Claims Provider Trusts
AD