AttackingADCS
In this course, we’re going to start by buidling our adcs lab, then explaining of the key elements to understanding how it works , which is PKI (Public Key Infrastructure). Then, we’ll move into the installation of ADCS and how sysadmins use it to secure their local infrastructure. We’ll also cover ADCS components like what a PKInit is, what a template is, CSR. Then we’ll dive into the most interesting part: abusing the misconfigurations left by sysadmins. To better understand this, we’ll create those misconfigurations in our lab, and then we’ll abuse them to escalate privileges or establish persistence.
> Initializing training sequence...
> Loading combat modules...
> Accessing power level database...
Course Chapters
Introduction
Introduction
What is a PKI ?
What is a PKI ?
ADCS Installation
ADCS Installation
Installing a CA in our domain
Installing a CA in our domain
Creating a template, EKU
Creating a template, EKU
What is a PIKINIT
What is a PIKINIT
Attacking ADCS - ESC1
Attacking ADCS - ESC1
Attacking ADCS - ESC2
Attacking ADCS - ESC2
Attacking ADCS - ESC3
Attacking ADCS - ESC3
Attacking ADCS - ESC8
Attacking ADCS - ESC8
What you’ll learn
- Introduction
- What is a PKI ?
- ADCS Installation
- Installing a CA in our domain
- Creating a template, EKU
- What is a PIKINIT
- Attacking ADCS - ESC1
- Attacking ADCS - ESC2
- Attacking ADCS - ESC3
- Attacking ADCS - ESC8
TOP WARRIORS
Join our leaderboard and prove your skills in real labs.