У нас вы можете посмотреть бесплатно ESC1 in Action: Domain Admin in 2 Clicks Using Certipy | ADCS Privesc Series Part 1 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
DISCLAIMER: This video is intended strictly for educational purposes. All actions are performed in a controlled lab environment. Do not attempt these techniques on any network you do not own or have explicit permission to test. Use this knowledge responsibly. Welcome to the first episode in my Active Directory Certificate Services (ADCS) Attack Series! In this kickoff video, we explore ESC1, one of the most impactful privilege escalation paths within ADCS. You’ll see how a misconfigured certificate template and the right tooling can let an attacker impersonate any domain user—including Domain Admins—in just two clicks using Certipy. Lab Setup: Attacker Machine: Kali Linux Domain Controller: Windows Server 2022 Certificate Authority (CA): Windows Server 2025 running ADCS Vulnerable Certificate Template: Vulnerable1 👉 Link to Ceripy: https://github.com/ly4k/Certipy 📌 More episodes are coming in this series where we’ll cover: ESC2, ESC3, ESC4, and beyond 💬 Drop your questions and lab ideas below, and don't forget to like, subscribe, and hit the bell to catch the rest of this ADCS attack series.