Back to Browse

Abusing Active Directory Certificate Services (ADCS) | ESC3 Attack Explained

849 views
May 20, 2024
4:12

Thanks for watching! You can access the full ADCS lab setup and download files using the link below: https://buymeacoffee.com/offensiveopslabs/e/516220 It includes the lab instructions and required resources. Let us know if you need help setting it up. Blog:https://www.rbtsec.com/blog/active-directory-certificate-services-adcs-esc3/ This video will walk you through ESC3, another escalation technique involving misconfigured Certificate Request Agent EKU known as “Enrollment Agent.” This technique allows a principal to enroll for a certificate on behalf of another user (domain admin). Educational Disclaimer: All content is intended for educational purposes only, to promote ethical hacking and security research. #ESC3 #pentest #internalpentest #ADCS #adcsattack #Pentesting #ActiveDirectory #CyberSecurity #EthicalHacking #RedTeam #SecurityResearch #EscalationTechniques #ADSecurity

Download

0 formats

No download links available.

Abusing Active Directory Certificate Services (ADCS) | ESC3 Attack Explained | NatokHD