Dragon Training Logo

AttackingADCS

In this course, we’re going to start by buidling our adcs lab, then explaining of the key elements to understanding how it works , which is PKI (Public Key Infrastructure). Then, we’ll move into the installation of ADCS and how sysadmins use it to secure their local infrastructure. We’ll also cover ADCS components like what a PKInit is, what a template is, CSR. Then we’ll dive into the most interesting part: abusing the misconfigurations left by sysadmins. To better understand this, we’ll create those misconfigurations in our lab, and then we’ll abuse them to escalate privileges or establish persistence.

> Initializing training sequence...

> Loading combat modules...

> Accessing power level database...

Course Chapters

Introduction

Introduction

DIFFICULTY

What is a PKI ?

What is a PKI ?

DIFFICULTY

ADCS Installation

ADCS Installation

DIFFICULTY

Installing a CA in our domain

Installing a CA in our domain

DIFFICULTY

Creating a template, EKU

Creating a template, EKU

DIFFICULTY

What is a PIKINIT

What is a PIKINIT

DIFFICULTY

Attacking ADCS - ESC1

Attacking ADCS - ESC1

DIFFICULTY

Attacking ADCS - ESC2

Attacking ADCS - ESC2

DIFFICULTY

Attacking ADCS - ESC3

Attacking ADCS - ESC3

DIFFICULTY

Attacking ADCS - ESC8

Attacking ADCS - ESC8

DIFFICULTY
SYSTEM.ONLINE

What you’ll learn

  • Introduction
  • What is a PKI ?
  • ADCS Installation
  • Installing a CA in our domain
  • Creating a template, EKU
  • What is a PIKINIT
  • Attacking ADCS - ESC1
  • Attacking ADCS - ESC2
  • Attacking ADCS - ESC3
  • Attacking ADCS - ESC8

TOP WARRIORS

Join our leaderboard and prove your skills in real labs.