description | coverY |
---|---|
Dive deep into our comprehensive article about Assumed Breach, a vital approach in cybersecurity. Learn its significance, advantages, and implementation strategies for improved security. |
0 |
After getting access into a machine we need to start understanding the system we are In!
---
title: CESP
---
mindmap
root((RFS))
Enumeration
Machines
Users & Groups
Administrators
Enterprise Admins
CA Admins
Certificates
Working with<br/>Certificates
Read Certificated Content
Convert Certificate
Kerberos
Uses
RBCD
S4U2self
PKINIT TGT
Tools
InvisiShell
Certify
Bypassing Defenses
ConfuseX
Loader
Organize all the common tools you use bypass any PowerShell restrictions and start Enumerating.
Remember the Enumeration focus is data to help us attack AD CS.
- Local Users
- Domain Users
- Domain Machines
- Local VM Restrictions
- Where is the DC?
- Where is the CA?
Local Users
// Some code
Domain Users
// Some code
Domain Machines
// Some code
Local VM Restrictions
// Some code
Where is the DC?
// Some code
Where is the CA?
// Some code