“- revoke - certificate - in - windows - ad - cs - https : / / www. thehacker. recipes / ad / movement / ad - cs / certificate - templates - https : / / dirkjanm. io / ntlm - relaying - to - ad - certificate - services / - pkinittools : https : / / github. com / dirkjanm / pkinitt…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1649Steal or Forge Authentication Certificates
93%
“abusing active directory certificate services ( part 2 ) abusing active directory certificate services ( part 2 ) misconfigurations in active directory certificate services ( adcs ) can introduce critical vulnerabilities into an enterprise active directory environment, such as pa…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1649Steal or Forge Authentication Certificates
87%
“##s 4900 and 4899 occur when an adcs object changes and enrollment occurs. by monitoring certificate change events, an administrator can alert on anomalous behavior, investigate template changes, and revoke certificates that appear to be malicious or suspicious. some useful event…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1649Steal or Forge Authentication Certificates
80%
“##sing active directory certificate services ( part 3 ) - abusing active directory certificate services ( part 4 ) - detecting adcs privilege escalation ready to learn more? level up your skills with affordable classes from antisyphon! pay - forward - what - you - can training av…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1649Steal or Forge Authentication Certificates
74%
“certipy results will return the request id or an object sid. note this, as you will need this information to revoke the certificate once the test is completed. update on april 21, 2025 microsoft recently pushed a partial patch to attempt to prevent privilege escalation. a link to…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1649Steal or Forge Authentication Certificates
62%
“template ' < vulnerable _ template _ name > ' \ - upn < domain _ admin > - sid < < domain _ admin _ sid > end update once we have our certificate, we can use the certificate to obtain the credential hash and a kerberos ticket of the target da account using the certipy - auth comm…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Misconfigurations in Active Directory Certificate Services (ADCS) can introduce critical vulnerabilities into an Enterprise Active Directory environment, such as paths of escalation from low privileged accounts to domain administrator.