Skip to content

Added a new certificate-based privilege escalation technique (ECS14-E… #1030

New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Merged
merged 1 commit into from
Jun 22, 2025

Conversation

steponeerror
Copy link
Contributor

Dear Maintainers,

Hello, I have learned a lot from HackTricks, and I would like to contribute to the project to help more people benefit from it. Due to my limited English proficiency, please forgive any grammar mistakes and give me a chance to improve them.

This PR primarily updates the domain-escalation.md document in the windows-hardening/active-directory-methodology/ad-certificates section. It introduces additional ADCS exploitation techniques (ECS14–ECS16), or at a minimum, guides readers to resources where they can quickly learn and understand these methodologies.

Due to language barriers, I have referenced some parts directly from the original articles. However, I made sure that all content is legitimate to quote, and I clearly indicated the sources.

Thank you for your time and consideration.

Best regards

@steponeerror
Copy link
Contributor Author

@carlospolop

@carlospolop
Copy link
Collaborator

This is great @steponeerror, thank you very much!
Any other updates on the Windows/AD part of hacktricks are very appreciated as it's complicated for me to find the time to update those sections

@carlospolop carlospolop merged commit 3ce324e into HackTricks-wiki:master Jun 22, 2025
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants