Shadow Credentials Attack Explained | Full Walkthrough with GenericWrite Over Admin
Автор: ruatelo
Загружено: 2025-12-14
Просмотров: 31
In this video, I walk through how to perform a Shadow Credentials attack in Active Directory when we have GenericWrite or Write access over a target user, such as a Domain Admin.
This attack leverages the msDS-KeyCredentialLink attribute, which stores raw public keys used during PKINIT pre-authentication. If we can write to that attribute, we can add our own public key, generate a private key, and request a valid Kerberos TGT for that user — without knowing their password.
Resources:
SpecterOps Blog (Shadow Credentials Theory): https://specterops.io/blog/2021/06/17...
This video is for educational purposes only. Do not use these techniques outside of environments you control or are authorized to test.
#ShadowCredentials #ActiveDirectory #msDSKeyCredentialLink #PKINIT #PrivilegeEscalation #Kerberos #ADSecurity #RedTeam #PostExploitation #pywhisker #ADCS #ActiveDirectoryExploitation #CyberSecurity #Infosec #Certipy #SpecterOps #Pentesting #TGT #KeyTrust #DomainEscalation #ShadowCredentialAttack
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: