filmov
tv
ADCS Installation | Attacking ADCS full course

Показать описание
Attacking Active directory certificate services full course
//////////////////////////////// Support Me /////////////////////////////////
///////////////////////// description /////////////////////////////
Whenever I have an Active Directory pentest, most of the time I see LDAPS and internal websites using HTTPS, but I never asked where those protocols or applications got their certificates , or maybe they’re signed from a public trusted certificate authority or a local certificate authority. Since we are dealing with Active Directory, it’s usually going to be ADCS (Active Directory Certificate Services). That's why I decided to spend the last three months learning how to attack and abuse ADCS, and at the same time, create this full course for you to learn as well.
In this course, we’re going to start by buidling our adcs lab, then explaining
of the key elements to understanding how it works , which is PKI (Public Key Infrastructure). Then, we’ll move into the installation of ADCS and how sysadmins use it to secure their local infrastructure. We’ll also cover ADCS components like what a PKInit is, what a template is, CSR.
Then we’ll dive into the most interesting part: abusing the misconfigurations left by sysadmins. To better understand this, we’ll create those misconfigurations in our lab, and then we’ll abuse them to escalate privileges or establish persistence.
All the modules are well-organized in this course. Feel free to jump to any part if you’re already familiar with it, or return to a section if you need a refresher.
I’d love for you to support this channel by subscribing, liking, and leaving a comment below regarding any mistakes or improvements we should implement in future videos.
Let’s get started.
------------------------------keywords-----------------------------------
//////////////////////////////// Support Me /////////////////////////////////
///////////////////////// description /////////////////////////////
Whenever I have an Active Directory pentest, most of the time I see LDAPS and internal websites using HTTPS, but I never asked where those protocols or applications got their certificates , or maybe they’re signed from a public trusted certificate authority or a local certificate authority. Since we are dealing with Active Directory, it’s usually going to be ADCS (Active Directory Certificate Services). That's why I decided to spend the last three months learning how to attack and abuse ADCS, and at the same time, create this full course for you to learn as well.
In this course, we’re going to start by buidling our adcs lab, then explaining
of the key elements to understanding how it works , which is PKI (Public Key Infrastructure). Then, we’ll move into the installation of ADCS and how sysadmins use it to secure their local infrastructure. We’ll also cover ADCS components like what a PKInit is, what a template is, CSR.
Then we’ll dive into the most interesting part: abusing the misconfigurations left by sysadmins. To better understand this, we’ll create those misconfigurations in our lab, and then we’ll abuse them to escalate privileges or establish persistence.
All the modules are well-organized in this course. Feel free to jump to any part if you’re already familiar with it, or return to a section if you need a refresher.
I’d love for you to support this channel by subscribing, liking, and leaving a comment below regarding any mistakes or improvements we should implement in future videos.
Let’s get started.
------------------------------keywords-----------------------------------
Комментарии