Back to Browse

Abusing Active Directory Certificate Services (ADCS) | ESC4 Attack Explained

939 views
May 27, 2024
3:44

Thanks for watching! You can access the full ADCS lab setup and download files using the link below: https://buymeacoffee.com/offensiveopslabs/e/516220 It includes the lab instructions and required resources. Let us know if you need help setting it up. Blog:https://www.rbtsec.com/blog/active-directory-certificate-services-adcs-esc4/ This video will explain #ESC4, an escalation technique that occurs due to misconfigurations on the certificate template. These security issues arise when a non-administrator account is able to modify a certificate template and gain access to privileged resources such as domain admin. These misconfigurations can happen when a member of a domain user group is granted the following template security permissions: Owner, WriteOwnerPrincipals, WriteDaclPrincipals, or WritePropertyPrincipals. Educational Disclaimer: All content is intended for educational purposes only, to promote ethical hacking and security research. #ADCS #adcsattack #Pentesting #ActiveDirectory #CyberSecurity #EthicalHacking #RedTeam #SecurityResearch #EscalationTechniques #ADSecurity #ESC6 #pentest #internalpentest #redteam #ADCS #ESC3 #pentest #internalpentest

Download

1 formats

Video Formats

360pmp47.2 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

Abusing Active Directory Certificate Services (ADCS) | ESC4 Attack Explained | NatokHD