Back to Browse

Abusing Active Directory Certificate Services (ADCS) | ESC6 Attack Explained

729 views
Jun 16, 2024
2:15

Thanks for watching! You can access the full ADCS lab setup and download files using the link below: https://buymeacoffee.com/offensiveopslabs/e/516220 It includes the lab instructions and required resources. Let us know if you need help setting it up. Blog:https://www.rbtsec.com/blog/active-directory-certificate-attack-adcs-esc6/ #adcs — #ESC6 If the EDITF_ATTRIBUTESUBJECTALTNAME2 is set on CA, then every template with client authentication enabled is vulnerable to ESC1 and can be used to request a certificate with a user-defined Subject Alternative Name even for domain admins. Educational Disclaimer: All content is intended for educational purposes only, to promote ethical hacking and security research. #ADCS #adcsattack #Pentesting #ActiveDirectory #CyberSecurity #EthicalHacking #RedTeam #SecurityResearch #EscalationTechniques #ADSecurity #ESC6 #pentest #internalpentest #redteam

Download

0 formats

No download links available.

Abusing Active Directory Certificate Services (ADCS) | ESC6 Attack Explained | NatokHD