Exploiting Microsoft Windows Active Directory Certificate Service CVE202226923
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=odn0eeGN_hk
In this video walk-through, we covered the recent vulnerability CVE-2022-26923 that affected Microsoft Windows Active Directory Certificate Service which allowed for local privilege escalation. • ********** • Receive Cyber Security Field Notes and Special Training Videos • / @motasemhamdan • ******* • Receive Cyber Security Field Notes and Special Training Videos • https://buymeacoffee.com/notescatalog... • Writeup • https://motasem-notes.net/exploiting-... • ******** • Store • https://buymeacoffee.com/notescatalog... • Patreon • / motasemhamdan • LinkedIn • [1]: / motasem-hamdan-7673289b • [2]: / motasem-eldad-ha-bb42481b2 • Instagram • / mastermindstudynotes • Google Profile • https://maps.app.goo.gl/eLotQQb7Dm6ai... • Twitter • / manmotasem • Facebook • / motasemhamdantty • **** • 0:00 Introduction • 0:13 Overview of the Vulnerability (CVE-2022-26923) • 1:13 Introduction to Active Directory Certificate Services (ADCS) • 2:14 Role of ADCS as Certificate Authority • 3:04 Use Cases of ADCS • 4:02 Exploitation Path through User Authentication • 4:40 Certificate Templates Overview • 5:07 Types of Certificate Templates • 6:04 Vulnerability in Machine Certificate Templates • 7:19 User Principal Name (UPN) and Subject Alternative Name (SAN) • 8:38 Why UPN Templates Are Secure • 9:33 Machine Certificate Templates and DNS Hostnames • 12:08 Exploiting DNS Hostnames in Machine Templates • 14:39 Role of Service Principal Names (SPNs) • 16:17 Steps for Exploitation • 18:29 Requesting Machine Certificates • 18:43 Final Authentication with Kerberos • 19:08 Practical Demonstration Using TryHackMe
#############################
