Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
🔍 [Day 2] ADCS Exploitation: ESC2


ESC2 involves misconfigured certificate templates permitting enrollment for any purpose, enabling unauthorized authentication or code signing.

📌 Key Points:

Risk: Templates with Any Purpose (OID 2.5.29.37.0) or SubCA (OID 2.5.29.19.20) allow misuse.

Exploitation: Attackers obtain certificates for unintended purposes (e.g., domain persistence).

Mitigation: Restrict templates to specific OIDs and enforce least-privilege enrollment.

📖 Reference: ESC2 Technical Breakdown


Next: ESC3 – Agent certificate abuse.
🔍 GMSA Password Attack: Exploiting Group Managed Service Accounts

Learn to extract & abuse GMSA passwords for AD privilege escalation:

Retrieve hashes using PowerShell & Mimikatz

Crack passwords & escalate privileges

Bypass restrictions via gMSAPassword exploitation

🔧 Key Techniques:

Get-ADServiceAccount hash extraction

DSInternals hash conversion

Kerberos ticket abuse

📖 Full Guide: Read Here
1
🔥Active Directory Red Team Ops Webinar (Free)🔥


We’re hosting a free 3-hour live webinar on Active Directory Red Team Operations, designed for professionals interested in real-world attack techniques used against enterprise AD environments.

🗓️ Date: 15th June 2025
🕒 Time: 6:00 PM IST to 9 PM IST

What you’ll learn
* MITRE-mapped AD attack paths
* Live demos: Kerberoasting & ACL-based privilege escalation
* Common misconfigurations exploited by attackers
* Red Teaming career roadmap & practical learning paths

🎓 Ideal for: Red Teamers, Blue Teamers, OSCP aspirants, and security engineers.

We’ll also unveil:
* 3-Weekend AD Workshop – ₹14,999
* 2.5-Month Advanced Course – ₹36,999

📌 Join here to register and get webinar details:
👉 https://chat.whatsapp.com/HWKRCQtcIiY27YXbk3BGKU

Feel free to message me if you have any questions.

Best Regards,
Ignite Technologies
1
Best of SQL Injection
How to set up SQLI Lab in Kali
https://www.hackingarticles.in/set-sqli-lab-kali/
Beginner’s Guide to SQL Injection (Part 1)
https://www.hackingarticles.in/beginner-guide-sql-injection-part-1/
Beginner Guide to SQL Injection Boolean Based (Part 2)
https://www.hackingarticles.in/beginner-guide-sql-injection-boolean-based-part-2/
How to Bypass SQL Injection Filter Manually
https://www.hackingarticles.in/bypass-filter-sql-injection-manually/
Form Based SQL Injection Manually
https://www.hackingarticles.in/form-based-sql-injection-manually/
Manual SQL Injection Exploitation Step by Step.
https://www.hackingarticles.in/manual-sql-injection-exploitation-step-step/
👍1