TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Detecting ADCS Privilege Escalation

BHIS · 2025-07-23 · Read original ↗

ATT&CK techniques detected

3 predictions
T1649Steal or Forge Authentication Certificates
94%
"couple of additional event ids to consider generating alerts for : - 4900 – security permissions for a certificate template changed - 4899 – certificate template was updated summary - misconfigurations in adcs can introduce critical vulnerabilities into an enterprise active direc…"
T1649Steal or Forge Authentication Certificates
40%
"detecting adcs privilege escalation detecting adcs privilege escalation active directory certificate services ( adcs ) is used to manage certificates for systems, users, applications, and more in an enterprise environment. misconfigurations in adcs can introduce critical vulnerab…"
T1649Steal or Forge Authentication Certificates
36%
"ip 192. 168. 2. 4 \ - u [ email protected ] \ - p ' redacted ' \ - ca doazlab - dc01 - ca \ - template doazlab _ user \ - dc - ip 192. 168. 2. 4 - upn [ email protected ] \ - sid $ doadminsid if you navigate to the sentinel resource in azure, you will see the graph that represent…"

Summary

Active Directory Certificate Services (ADCS) is used to manage certificates for systems, users, applications, and more in an enterprise environment. Misconfigurations in ADCS can introduce critical vulnerabilities into an enterprise Active Directory environment.

The post Detecting ADCS Privilege Escalation appeared first on Black Hills Information Security, Inc..