Thanks for watching! You can access the full ADCS lab setup and download files using the link below:
https://buymeacoffee.com/offensiveopslabs/e/516220
It includes the lab instructions and required resources. Let us know if you need help setting it up.
Blog:https://www.rbtsec.com/blog/active-directory-certificate-services-adcs-esc4/
This video will explain #ESC4, an escalation technique that occurs due to misconfigurations on the certificate template. These security issues arise when a non-administrator account is able to modify a certificate template and gain access to privileged resources such as domain admin. These misconfigurations can happen when a member of a domain user group is granted the following template security permissions: Owner, WriteOwnerPrincipals, WriteDaclPrincipals, or WritePropertyPrincipals.
Educational Disclaimer:
All content is intended for educational purposes only, to promote ethical hacking and security research.
#ADCS #adcsattack #Pentesting #ActiveDirectory #CyberSecurity #EthicalHacking #RedTeam #SecurityResearch #EscalationTechniques #ADSecurity #ESC6 #pentest #internalpentest #redteam #ADCS #ESC3 #pentest #internalpentest