Attacking ADCS ESC1 | full course

preview_player
Показать описание
Attacking Active directory certificate services full course
//////////////////////////////// Support Me /////////////////////////////////

///////////////////////// description /////////////////////////////
Whenever I have an Active Directory pentest, most of the time I see LDAPS and internal websites using HTTPS, but I never asked where those protocols or applications got their certificates , or maybe they’re signed from a public trusted certificate authority or a local certificate authority. Since we are dealing with Active Directory, it’s usually going to be ADCS (Active Directory Certificate Services). That's why I decided to spend the last three months learning how to attack and abuse ADCS, and at the same time, create this full course for you to learn as well.

In this course, we’re going to start by buidling our adcs lab, then explaining
of the key elements to understanding how it works , which is PKI (Public Key Infrastructure). Then, we’ll move into the installation of ADCS and how sysadmins use it to secure their local infrastructure. We’ll also cover ADCS components like what a PKInit is, what a template is, CSR.
Then we’ll dive into the most interesting part: abusing the misconfigurations left by sysadmins. To better understand this, we’ll create those misconfigurations in our lab, and then we’ll abuse them to escalate privileges or establish persistence.
All the modules are well-organized in this course. Feel free to jump to any part if you’re already familiar with it, or return to a section if you need a refresher.
I’d love for you to support this channel by subscribing, liking, and leaving a comment below regarding any mistakes or improvements we should implement in future videos.
Let’s get started.
------------------------------keywords-----------------------------------
Рекомендации по теме
Комментарии
Автор

WonderFul Explaination
but i guess you should make a video on, how many type of ADCS attacks are there like in this video you showen ESC1 and there are total 8 i guess in which from the new update from Microsoft they have remove ESC2, ESC4, ESC5, ESC7, ESC8 and as per my knowledge there are ESC1, ESC3, ESC6 are only which are working fine

try to make a overiew video on this all attacks types in one video then make a separate video after that

__pain__