Go offline with the Player FM app!
Certified Vulnerable: How Certificates Can Be Exploited
Manage episode 365834271 series 3404023
A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In this episode the crew overviews certificates, a big topic that transcends any one vendor or environment. Certificates are like an electronic passport meant to uniquely identify a person, computer or application on a network. This specific family of vulnerabilities discussed affects the Microsoft Active Directory certificate services, which is Microsoft’s own built-in PKI or public key infrastructure included with Window’s servers and domains. Micah walks us through a pentest demo illustrating the ways this system can be exploited as well as providing tips on how to protect business networks from this attack.
Chapters
1. Podcast Introduction (00:00:00)
2. Meet Micah: Red Team Consultant (00:00:41)
3. Effective Security Tools Against Pen Testing (00:01:33)
4. Microsoft Certificate Services Overview (00:02:42)
5. ESC Vulnerabilities History and Types (00:07:34)
6. Live Demo: ESC1 Exploitation (00:10:44)
7. Defense Strategies and Detection (00:20:14)
8. Insider Threat Considerations (00:26:15)
65 episodes
Manage episode 365834271 series 3404023
A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In this episode the crew overviews certificates, a big topic that transcends any one vendor or environment. Certificates are like an electronic passport meant to uniquely identify a person, computer or application on a network. This specific family of vulnerabilities discussed affects the Microsoft Active Directory certificate services, which is Microsoft’s own built-in PKI or public key infrastructure included with Window’s servers and domains. Micah walks us through a pentest demo illustrating the ways this system can be exploited as well as providing tips on how to protect business networks from this attack.
Chapters
1. Podcast Introduction (00:00:00)
2. Meet Micah: Red Team Consultant (00:00:41)
3. Effective Security Tools Against Pen Testing (00:01:33)
4. Microsoft Certificate Services Overview (00:02:42)
5. ESC Vulnerabilities History and Types (00:07:34)
6. Live Demo: ESC1 Exploitation (00:10:44)
7. Defense Strategies and Detection (00:20:14)
8. Insider Threat Considerations (00:26:15)
65 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.