Back to Browse

Abusing Active Directory Certificate Services (ADCS) | ESC8 Attack Explained

2.1K views
Sep 18, 2024
5:05

Thanks for watching! You can access the full ADCS lab setup and download files using the link below: https://buymeacoffee.com/offensiveopslabs/e/516220 It includes the lab instructions and required resources. Let us know if you need help setting it up. The ADCS ESC8 attack is a powerful privilege escalation method within Active Directory Certificate Services (ADCS). It leverages NTLM relay attacks against vulnerable web enrollment endpoints to obtain certificates, allowing attackers to escalate privileges and potentially gain broad access within the domain. Blog: https://www.rbtsec.com/blog/active-directory-certificate-attack-esc8-adcs-web-enrollment/ Watch Nex t: Active Directory Certificate Attack Playlist: https://youtube.com/playlist?list=PLUMEY7cBcvDP19HB3qoBO6uTp-wxDFbFX&si=y_7JrMMDz2Z13fQY Follow Us: LinkedIn: https://www.linkedin.com/company/rbtsecurity/ Twitter: https://twitter.com/RBTSecurity Facebook: https://www.facebook.com/RBTSecur1ty/ Contact Us: For business inquiries and collaborations, please email us at [email protected] Educational Disclaimer: All content is intended for educational purposes only, to promote ethical hacking and security research. #ESC8 #ADCS #adcsattack #Pentesting #ActiveDirectory #CyberSecurity #EthicalHacking #RedTeam #SecurityResearch #EscalationTechniques #ADSecurity

Download

0 formats

No download links available.

Abusing Active Directory Certificate Services (ADCS) | ESC8 Attack Explained | NatokHD