Organizations often discover Active Directory Certificate Services (AD CS) vulnerabilities long after they are introduced. In many cases, assessments only uncover the most obvious attack paths. Following a more thorough assessment, or a compromise, defenders are left wondering if these vulnerabilities have been exploited by stealthier actors.
In the AD CS Abuse module, we learn PKI and AD CS fundamentals. This module digs deeper into AD CS artifacts and discusses actionable ways to hunt for past or ongoing attacker presence. We also cover ways to discover abuse even when the attacker covers their tracks or the vulnerability was not previously known.
This module assumes you have completed the AD CS Abuse module.
/mo
Explore realistic pre-recorded attacks
Master full-featured defensive platforms
Browser-based challenges and modules
Extended attack videos
Grants access to Analyst content. You can cancel any time by returning to this page and following the cancellation steps.
/mo
Instant fully interactive labs
Hands-on prevention and detection
Master offensive techniques
Security engineering exercises
Highly realistic and dynamic scenarios
Access to all Analyst-level content
Grants access to all Defender content, Analyst content and interactive lab environments. You can cancel any time by returning to this page and following the cancellation steps.