ADCS Certified Enterprise Security Professional
HomeAuthor
  • CESP Certification
  • 🔥RFS Methodology
    • Pwning
  • 1️⃣ Learn AD CS (Module 1)
    • Active Directory Certificate Services (AD CS)
    • 🟢AD CS Components
    • 🟢Certificate Formats
    • Certificate Attributes
    • Containers in AD
  • 2️⃣ AD CS Attacks (Module 2)
    • Attack
    • Prevention
    • Detection
  • 3️⃣ Basics of AD CS Attacks (Module 3)
    • Tools
    • AV Bypass
    • Payload Delivery
    • 🟢Bypass PowerShell Logging
    • WinRS
    • 🟢Certificate Management
    • 🟢Pass the Cert
    • 🟢UnPAC the Hash
    • 🟢S4U2Self Attack
  • 4️⃣ AD CS Patches (Module 4)
    • 🟢CBA patch
    • 🟢ADCS SID Extension Policy Module
  • 5️⃣ AD CS Enumeration (Module 5)
    • 🥰Methodology
    • Tools
    • 🟢CAs Info
    • Groups
    • Extract the Private Key
  • 6️⃣ AD CS Local Privilege Escalation (Module 6)
    • 🟢CertPotato
    • 🟢ESC1 – Understand the Arbitrary Subject Alternative Name Vulnerability
  • AD CS Domain Privilege Escalation
    • Page 3
  • AD CS Pivoting and Lateral Movement
    • Page 4
  • AD CS Theft and Collection
    • Page 5
  • AD CS Local and Domain Persistence
    • Page 6
  • Abusing Cross Forest and External Trusted CAs
    • Page 7
  • Abusing Azure CBA for Lateral Movement and Persistence on Cloud
    • Page 8
  • Evasion and Bypasses
    • Page 9
  • Group 1
    • Page 2
Powered by GitBook
On this page

Was this helpful?

  1. 3️⃣ Basics of AD CS Attacks (Module 3)

Tools

AD CS Attacks Tools

- Certi Impacket copy of Certify to abuse AD CS. – ADCSKiller automated discovery and exploitation of AD CS abuses.

– The PKINIT Tools repo contains some utilities for playing with PKINIT and certificates.

– PoshAD CS proof of concept on attack vectors against Active Directory by abusing AD CS.

– ForgeCert forge certificates for any user using compromised CA certificates and private keys.

– pyForgeCert Python equivalent of ForgeCert – modifyCertTemplate Python equivalent with more manual granular control of ForgeCert

– CarbonCopy creates a spoofed certificate of any online website and signs an Executable for AV Evasion.

– KrbRelayUp is a universal no-fix local privilege escalation in Windows domain environments where LDAP signing is not enforced (the default settings).

PreviousDetectionNextAV Bypass

Last updated 1 year ago

Was this helpful?