Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Active Directory Certificate Attack

ADCS ESC5: Vulnerable PKI Object Access Control

May 11, 2025 by raj6 Min Reading

ESC5 is a high-risk certificate attack targeting Active Directory Certificate Services (ADCS). This ADCS attack exploits insecure access to the Certificate Authority (CA)’s private key.

Active Directory Certificate Attack

ADCS ESC4: Vulnerable Certificate Template Access Control

May 10, 2025 by raj10 Min Reading

ESC4 Active Directory Certificate Services Vulnerability is a high-risk vulnerability in Active Directory Certificate Services (ADCS) that enables attackers to exploit misconfigured certificate template permissions

Active Directory Certificate Attack

ADCS ESC3: Enrollment Agent Template

May 3, 2025 by raj9 Min Reading

Active Directory Certificate Services (ADCS) is commonly targeted in ESC3 certificate attacks, which exploit misconfigurations in certificate templates to enable serious vulnerabilities such as ADCS

Active Directory Certificate Attack

AD Certificate Exploitation: ESC2

April 29, 2025 by raj11 Min Reading

In the last article of this AD CS series, we looked at how ESC1 can be used to gain higher privileges in Active Directory. In

Persistence

Sapphire Ticket Attack: Abusing Kerberos Trust

April 13, 2025 by raj13 Min Reading

Sapphire Ticket attacks are an advanced form of Kerberos exploitation within Active Directory environments. As the use of AD continues to grow, attackers are constantly

Active Directory Certificate Attack

AD Certificate Exploitation: ESC1

April 6, 2025 by raj12 Min Reading

AD CS ESC1 Certificate Exploitation is a critical vulnerability in Active Directory Certificate Services. In this article, we will explores how misconfigured certificate templates can

Credential Dumping, Domain Credential

Credential Dumping: GMSA

April 6, 2025 by raj12 Min Reading

ReadGMSAPassword Attack is a technique where attackers abuse misconfigured Group Managed Service Accounts (gMSA) to retrieve their passwords. In Active Directory, ReadGMSAPassword should only be

Red Teaming

Shadow Credentials Attack

February 12, 2025 by raj16 Min Reading

To begin with, this post explores the exploitation technique known as the Shadow Credentials attack. This attack leverages the mismanagement or exploitation of Active Directory

Red Teaming

Abusing AD Weak Permission Pre2K Compatibility

February 8, 2025 by raj5 Min Reading

Pre2K Active Directory misconfigurations (short for “Pre-Windows 2000”) often stem from overlooked legacy settings in Windows environments. Common issues include enabling NTLM or SMBv1 for

Posts pagination

Previous 1 … 5 6 7 … 155 Next

Categories

© All Rights Reserved 2021 Theme: Prefer by Template Sell.