Artwork

Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Certified Vulnerable: How Certificates Can Be Exploited

29:43
 
Share
 

Manage episode 365834271 series 3404023
Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In this episode the crew overviews certificates, a big topic that transcends any one vendor or environment. Certificates are like an electronic passport meant to uniquely identify a person, computer or application on a network. This specific family of vulnerabilities discussed affects the Microsoft Active Directory certificate services, which is Microsoft’s own built-in PKI or public key infrastructure included with Window’s servers and domains. Micah walks us through a pentest demo illustrating the ways this system can be exploited as well as providing tips on how to protect business networks from this attack.

  continue reading

Chapters

1. Podcast Introduction (00:00:00)

2. Meet Micah: Red Team Consultant (00:00:41)

3. Effective Security Tools Against Pen Testing (00:01:33)

4. Microsoft Certificate Services Overview (00:02:42)

5. ESC Vulnerabilities History and Types (00:07:34)

6. Live Demo: ESC1 Exploitation (00:10:44)

7. Defense Strategies and Detection (00:20:14)

8. Insider Threat Considerations (00:26:15)

65 episodes

Artwork
iconShare
 
Manage episode 365834271 series 3404023
Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In this episode the crew overviews certificates, a big topic that transcends any one vendor or environment. Certificates are like an electronic passport meant to uniquely identify a person, computer or application on a network. This specific family of vulnerabilities discussed affects the Microsoft Active Directory certificate services, which is Microsoft’s own built-in PKI or public key infrastructure included with Window’s servers and domains. Micah walks us through a pentest demo illustrating the ways this system can be exploited as well as providing tips on how to protect business networks from this attack.

  continue reading

Chapters

1. Podcast Introduction (00:00:00)

2. Meet Micah: Red Team Consultant (00:00:41)

3. Effective Security Tools Against Pen Testing (00:01:33)

4. Microsoft Certificate Services Overview (00:02:42)

5. ESC Vulnerabilities History and Types (00:07:34)

6. Live Demo: ESC1 Exploitation (00:10:44)

7. Defense Strategies and Detection (00:20:14)

8. Insider Threat Considerations (00:26:15)

65 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play