ADCS Certified Enterprise Security Professional
HomeAuthor
  • CESP Certification
  • 🔥RFS Methodology
    • Pwning
  • 1️⃣ Learn AD CS (Module 1)
    • Active Directory Certificate Services (AD CS)
    • 🟢AD CS Components
    • 🟢Certificate Formats
    • Certificate Attributes
    • Containers in AD
  • 2️⃣ AD CS Attacks (Module 2)
    • Attack
    • Prevention
    • Detection
  • 3️⃣ Basics of AD CS Attacks (Module 3)
    • Tools
    • AV Bypass
    • Payload Delivery
    • 🟢Bypass PowerShell Logging
    • WinRS
    • 🟢Certificate Management
    • 🟢Pass the Cert
    • 🟢UnPAC the Hash
    • 🟢S4U2Self Attack
  • 4️⃣ AD CS Patches (Module 4)
    • 🟢CBA patch
    • 🟢ADCS SID Extension Policy Module
  • 5️⃣ AD CS Enumeration (Module 5)
    • 🥰Methodology
    • Tools
    • 🟢CAs Info
    • Groups
    • Extract the Private Key
  • 6️⃣ AD CS Local Privilege Escalation (Module 6)
    • 🟢CertPotato
    • 🟢ESC1 – Understand the Arbitrary Subject Alternative Name Vulnerability
  • AD CS Domain Privilege Escalation
    • Page 3
  • AD CS Pivoting and Lateral Movement
    • Page 4
  • AD CS Theft and Collection
    • Page 5
  • AD CS Local and Domain Persistence
    • Page 6
  • Abusing Cross Forest and External Trusted CAs
    • Page 7
  • Abusing Azure CBA for Lateral Movement and Persistence on Cloud
    • Page 8
  • Evasion and Bypasses
    • Page 9
  • Group 1
    • Page 2
Powered by GitBook
On this page

Was this helpful?

  1. 1️⃣ Learn AD CS (Module 1)

Containers in AD

Explore our comprehensive guide on Containers in AD and gain an in-depth understanding of their role in domain structure, benefits, and management. Improve your AD knowledge today.

Active Directory Certificate Services Containers:

  • Certificate Templates: Stores certificate templates utilized by Enterprise CAs for generating certificates.

  • Certification Authorities: This container holds trusted root certificates ensuring security across the network. These certificates are automatically disseminated to each client’s Trusted Root Certification Authorities via Group Policy, establishing a base of trust.

  • Enrollment Services: Focuses on housing Enterprise CA objects. It is instrumental for clients in finding Enterprise CAs. Similar to the Certification Authorities container, certificates here are also propagated to each client’s Intermediate Certification Authorities through Group Policy.

  • NTAuthCertificates: A specialized container storing certificates from CAs authorized to issue smart card logon certificates and manage client private key archival. For a smart card logon to proceed successfully, the issuing CA’s certificate must be present in this container, acting as a critical security measure.

These containers play pivotal roles in the management and deployment of certificates within a network, ensuring authentication, authorization, and secure communication.

PreviousCertificate AttributesNextAttack

Last updated 1 year ago

Was this helpful?