Exploiting Microsoft Windows Active Directory Certificate Service CVE202226923











>> YOUR LINK HERE: ___ http://youtube.com/watch?v=odn0eeGN_hk

In this video walk-through, we covered the recent vulnerability CVE-2022-26923 that affected Microsoft Windows Active Directory Certificate Service which allowed for local privilege escalation. • ********** • Receive Cyber Security Field Notes and Special Training Videos •    / @motasemhamdan   • ******* • Receive Cyber Security Field Notes and Special Training Videos • https://buymeacoffee.com/notescatalog... • Writeup • https://motasem-notes.net/exploiting-... • ******** • Store • https://buymeacoffee.com/notescatalog... • Patreon •   / motasemhamdan   • LinkedIn • [1]:   / motasem-hamdan-7673289b   • [2]:   / motasem-eldad-ha-bb42481b2   • Instagram •   / mastermindstudynotes   • Google Profile • https://maps.app.goo.gl/eLotQQb7Dm6ai... • Twitter •   / manmotasem   • Facebook •   / motasemhamdantty   • **** • 0:00 Introduction • 0:13 Overview of the Vulnerability (CVE-2022-26923) • 1:13 Introduction to Active Directory Certificate Services (ADCS) • 2:14 Role of ADCS as Certificate Authority • 3:04 Use Cases of ADCS • 4:02 Exploitation Path through User Authentication • 4:40 Certificate Templates Overview • 5:07 Types of Certificate Templates • 6:04 Vulnerability in Machine Certificate Templates • 7:19 User Principal Name (UPN) and Subject Alternative Name (SAN) • 8:38 Why UPN Templates Are Secure • 9:33 Machine Certificate Templates and DNS Hostnames • 12:08 Exploiting DNS Hostnames in Machine Templates • 14:39 Role of Service Principal Names (SPNs) • 16:17 Steps for Exploitation • 18:29 Requesting Machine Certificates • 18:43 Final Authentication with Kerberos • 19:08 Practical Demonstration Using TryHackMe

#############################









Content Report
Youtor.org / YTube video Downloader © 2025

created by www.youtor.org