Exploiting Microsoft Windows Active Directory Certificate Service | CVE-2022-26923

Поділитися
Вставка
  • Опубліковано 11 тра 2022
  • In this video walk-through, we covered the recent vulnerability CVE-2022-26923 that affected Microsoft Windows Active Directory Certificate Service which allowed for local privilege escalation.
    **********
    Receive Cyber Security Field Notes and Special Training Videos
    / @motasemhamdan
    *******
    Challenge Answers
    motasem-notes.net/exploiting-...
    ************
    Patreon
    www.patreon.com/motasemhamdan...
    Backup channel
    / @hacknotesbackup
    My Movie channel:
    / @motasemhamdanhacknotes
    ******

КОМЕНТАРІ • 21

  • @guitarware
    @guitarware Рік тому +1

    Thank you for this vulnerability breakdown and for even going through how ADCS works, very helpful. Liked and subbed

  • @eslammohamed7877
    @eslammohamed7877 Рік тому +1

    great video as usual how can i know ADCS hostname if i fully black box or i can just use DC hostname

  • @diegocondori5673
    @diegocondori5673 2 роки тому +2

    nice

  • @baconblaster6422
    @baconblaster6422 Рік тому

    Great breakdown ! Subbed

  • @user-ru6qb8hq2d
    @user-ru6qb8hq2d 2 роки тому +2

    Cool

  • @user-uj8bo5bc7e
    @user-uj8bo5bc7e 2 роки тому

    Great video!
    It gives me a better understanding of AD and vulnerabilities.
    I have one question.
    What software is used in the video when you explain with diagrams?
    I ask because I think it is a good software that can explain things clearly.

  • @steak2254
    @steak2254 Рік тому

    Please tell me, will I be able to exploit the invulnerability of CVE-2022-26923 with Certify.exe instead of certipy?

  • @wolfrevokcats7890
    @wolfrevokcats7890 Місяць тому

    0:07 doesn't make sense? Why?

  • @solofonantenaina5975
    @solofonantenaina5975 2 роки тому

    Hello, i have an issue when i tried to request a TGT. I have this error: Kerberos SessionError: KDC_ERR_PADATA_TYPE_NOSUPP. And Can you explain please, why you have a ssh connection into the domain controller? Thank you,

    • @solofonantenaina5975
      @solofonantenaina5975 2 роки тому

      My bad i forgot to request a certificate for the KDC that's why i got this error. But other thant that, can you explain please why you have ssh connexion to the domain controller? I thought the thm user has a low privileges.

  • @Yashovardhan777
    @Yashovardhan777 2 роки тому +1

    will this CVE-2022-26923
    is applicable for Azure AD or on-prem or both?

  • @siripongjintung6316
    @siripongjintung6316 2 роки тому

    When i got NTLM hash for the machine account. Can i "pass the hash" on NTLM hash ?

    • @MotasemHamdan
      @MotasemHamdan  2 роки тому +1

      You can try :)

    • @siripongjintung6316
      @siripongjintung6316 2 роки тому

      @@MotasemHamdan I send my issue to your mail. Please review on it.

    • @CyberCelt.
      @CyberCelt. 2 роки тому

      I struggled today to pass it. Did you get it working? I wasn't sure what user the hash was for either. I think lunadc$...

  • @mohamedali8605
    @mohamedali8605 2 роки тому

    Hi my friend I have 2 questions first you logged on the Lunar machine using ssh thm@ip & using password:Password1@ ????
    second I keep getting this error when using Certipy failed to resolve lundc.lunar.eruca , is there something I'm missing my friend & thanks for all your efforts.

    • @mohamedali8605
      @mohamedali8605 2 роки тому

      problem solved I didn't configure the DNS in the script at /etc/hosts thanks anyway for your efforts :) ;)