We can enumerate available Certificates Templates using certutil
certutil -v -template
We can also us certipy with the -vulnerable flag to enumerate vulnerable templates
Identifying Poisonous Combinations
For this task, there are three key parameters we should find, based on the dangerous combinations I mentioned previously. We are to find three parameters:
Allow Enroll or Allow Full Control
Client Authentication
CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT
Looking at the output of the Certipy tool above, we find 2 templates that are vulnerable. The one we are looking at is UserRequest