Authentication coercion
Technique
Authentication Coercion is a technique that forces Windows systems (typically servers or domain controllers) to initiate authentication to an attacker-controlled system. This coerced authentication can then be captured or relayed to access other services or systems.
The attack exploits various Microsoft protocols and APIs that can be abused to trigger NTLM authentication, including: - MS-EFSRPC (Encrypting File System Remote Protocol) - PetitPotam - MS-RPRN (Print System Remote Protocol) - PrinterBug - MS-FSRVP (File Server Remote VSS Protocol) - ShadowCoerce - Many others across various Windows services
These attacks are particularly dangerous when combined with NTLM relay attacks, especially against Active Directory Certificate Services (AD CS).
Prerequisites
Access Level: Many coercion methods require network access but no authentication, though some methods require low-privilege authenticated access.
System State: - Target must have the vulnerable service or API enabled - NTLM authentication must be enabled in the environment - For effective exploitation via relay: SMB signing must be disabled on target systems
Multi-Method Coercion
Using Coercer
Coercer attempts 12 different methods to coerce authentication:
PetitPotam (MS-EFSRPC)
PetitPotam is one of the most reliable authentication coercion techniques, exploiting the Encrypting File System Remote Protocol.
Requirements
| Feature / Component | Required for PetitPotam | Required for Full Relay to DA via AD CS |
|---|---|---|
| EFSRPC | ✅ Yes | ✅ Yes |
| NTLM Enabled | ✅ Yes | ✅ Yes |
| SMB/LDAP Signing Disabled | ✅ Yes (on relay target) | ✅ Yes (on certsrv or LDAP) |
| AD CS Installed | ❌ No | ✅ Yes |
| Vulnerable AD CS Template | ❌ No | ✅ Yes |
| EPA / Channel Binding Off | ❌ No | ✅ Yes |
Identification
Using NetExec:
Shorthand:
Exploitation with NTLM Relay to AD CS
-
Start ntlmrelayx to relay authentication to AD CS:
-
Coerce authentication from the domain controller:
Or using NetExec:
-
If successful, ntlmrelayx will output a base64 encoded certificate.
-
Use the certificate to request a Kerberos TGT for the domain controller:
-
Set the Kerberos environment variable:
-
Perform DCSync to extract credentials:
Other Coercion Methods
PrinterBug (MS-RPRN)
Exploits the Print System Remote Protocol:
ShadowCoerce (MS-FSRVP)
Exploits the File Server Remote VSS Protocol:
WebClient Service Coercion
Exploits the WebClient service to force a connection:
Detection & Mitigation
Detection
- Monitor for unexpected authentication attempts from servers and domain controllers
- Look for Event ID 4624 (logon) and 4625 (failed logon) events from critical servers to unusual destinations
- Watch for RPC calls to suspicious or unusual endpoints
- Monitor for exploitation of specific protocol methods associated with coercion attacks
Mitigation
- Apply Microsoft's security updates that address specific coercion vulnerabilities
- Enable Extended Protection for Authentication (EPA) and channel binding
- Enforce SMB signing across the environment, especially on domain controllers
- Block or restrict access to vulnerable RPC endpoints
- Disable NTLM authentication where possible in favor of Kerberos
- For AD CS relay attacks:
- Configure certificate templates to require stronger authentication
- Enable HTTPS on Certificate Authority Web Enrollment
- Implement network segmentation to isolate critical servers