- Certpotato : using adcs to privesc from service accounts to local system https://sensepost.com/blog/2022/certpotato-using-adcs-to-privesc-from-virtual-and-network-service-accounts-to-local-system/ 8 comments netsec
Linking pages
Linked pages
- Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory | Shenanigans Labs https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html 38 comments
- Shadow Credentials: Abusing Key Trust Account Mapping for Account Takeover | by Elad Shamir | Posts By SpecterOps Team Members https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab 3 comments
- GitHub - ly4k/Certipy: Tool for Active Directory Certificate Services enumeration and abuse https://github.com/ly4k/Certipy 0 comments
- GitHub - GhostPack/Certify: Active Directory certificate abuse. https://github.com/GhostPack/Certify 0 comments
Related searches:
Search whole site: site:sensepost.com
Search title: SensePost | Certpotato â using adcs to privesc from virtual and network service accounts to local system
See how to search.