ESC1 in Action: Domain Admin in 2 Clicks Using Certipy | ADCS Privesc Series Part 1
Автор: ruatelo
Загружено: 2025-09-30
Просмотров: 65
DISCLAIMER:
This video is intended strictly for educational purposes. All actions are performed in a controlled lab environment. Do not attempt these techniques on any network you do not own or have explicit permission to test. Use this knowledge responsibly.
Welcome to the first episode in my Active Directory Certificate Services (ADCS) Attack Series!
In this kickoff video, we explore ESC1, one of the most impactful privilege escalation paths within ADCS. You’ll see how a misconfigured certificate template and the right tooling can let an attacker impersonate any domain user—including Domain Admins—in just two clicks using Certipy.
Lab Setup:
Attacker Machine: Kali Linux
Domain Controller: Windows Server 2022
Certificate Authority (CA): Windows Server 2025 running ADCS
Vulnerable Certificate Template: Vulnerable1
👉 Link to Ceripy: https://github.com/ly4k/Certipy
📌 More episodes are coming in this series where we’ll cover: ESC2, ESC3, ESC4, and beyond
💬 Drop your questions and lab ideas below, and don't forget to like, subscribe, and hit the bell to catch the rest of this ADCS attack series.
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: