ADCS ESC1 Exploitation
A misconfiguration in AD CS that lets attackers exploit weak certificate template permissions to escalate privileges.
Explore my little space, where I share my reports of labs I breach, reviews of certifications I earn, and practical cheat sheets I write up as I go through all the experiences gained from labs, certifications completed, real-world challenges, methodologies, tools, insights, and techniques explored during my journey.
Take your time to explore the reports, reviews and articles below. And if you're curious to learn more about the person behind the articles on this blog, visit my About Me page.
A misconfiguration in AD CS that lets attackers exploit weak certificate template permissions to escalate privileges.
Exploiting trust relationships to escalate privileges and access resources across Active Directory domains.
Here are a set of commands, utilities and attacks collected for the OSWP and CWP certifications.
Here are a set of commands, utilities and attacks collected for the OSCP certification.
Keylogger in JavaScript to inject it via XSS.
These are the steps taken to solve the Stack Overflow exercises of the Protostar lab.
These are the steps taken to solve the Stack Overflow exercises of the Behemoth0 lab.
These are the steps taken to solve the Stack Overflow exercises of the Behemoth1 lab.
These are the steps taken to solve the Stack Overflow exercises of the Behemoth2 lab.
These are the steps taken to solve the Stack Overflow exercises of the Behemoth3 lab.