ACE

RESPONDER

Attack Animator

Blog

Learn

Challenges

Sign in

Organizations often discover Active Directory Certificate Services (AD CS) vulnerabilities long after they are introduced. In many cases, assessments only uncover the most obvious attack paths. Following a more thorough assessment, or a compromise, defenders are left wondering if these vulnerabilities have been exploited by stealthier actors.

In the [AD CS Abuse](https://www.aceresponder.com/learn/adcs) module, we learn PKI and AD CS fundamentals. This module digs deeper into AD CS artifacts and discusses actionable ways to hunt for past or ongoing attacker presence. We also cover ways to discover abuse even when the attacker covers their tracks or the vulnerability was not previously known.

This module assumes you have completed the [AD CS Abuse](https://www.aceresponder.com/learn/adcs) module.

Hunting AD CS Abuse

Share on Twitter
Share on LinkedIn

Organizations often discover Active Directory Certificate Services (AD CS) vulnerabilities long after they are introduced. In many cases, assessments only uncover the most obvious attack paths. Following a more thorough assessment, or a compromise, defenders are left wondering if these vulnerabilities have been exploited by stealthier actors.

In the AD CS Abuse module, we learn PKI and AD CS fundamentals. This module digs deeper into AD CS artifacts and discusses actionable ways to hunt for past or ongoing attacker presence. We also cover ways to discover abuse even when the attacker covers their tracks or the vulnerability was not previously known.

This module assumes you have completed the AD CS Abuse module.

Analyst

$17.49

/mo

14 Days Free

Explore realistic pre-recorded attacks

Master full-featured defensive platforms

Browser-based challenges and modules

Extended attack videos

Grants access to Analyst content. You can cancel any time by returning to this page and following the cancellation steps.

Defender

$44.49

/mo


Instant fully interactive labs

Hands-on prevention and detection

Master offensive techniques

Security engineering exercises

Highly realistic and dynamic scenarios

Access to all Analyst-level content

Grants access to all Defender content, Analyst content and interactive lab environments. You can cancel any time by returning to this page and following the cancellation steps.