Exploiting Active Directory Certificate Services - ESC11 Walkthrough
An overview and lab exploitation example of the ESC11 vulnerability, present in Active Directory Certificate Services when request encryption is disabled.
An overview and lab exploitation example of the ESC11 vulnerability, present in Active Directory Certificate Services when request encryption is disabled.
Hathor from Hack the Box was an Insane Windows machine that involves exploiting a misconfigured file upload, then identifying credentials in log files, before performing some DLL hijacking and finally, abusing an account with replication rights to obtain the administrator’s password hash.
In an attempt to broaden my skill set, I’ll be using the SliverC2 to complete Hack the Box machines and learn more about this fantastic Command and Control framework. This time around it’s the retired box: Anubis!
A blog post for me to try and finally fully understand the internals of how Kerberos and Active Directory authentication works within a domain (and how it’s broken).