#ADCS

2026-01-16

Is today a #FediHire Friday? Sure looks like it!

What I'm looking for: A senior level, individual contributor role supporting Windows, Active Directory, Certificates, PKI, Azure, and information security in a large enterprise. I like to solve weird problems and make computers run smoothly. I want to help others use technology effectively. Interested in relocating outside of the US.

My main focus the last few years has been rebuilding and modernizing a struggling certificate environment. That includes growing the team to meet our company needs, migrating our AD-integrated private PKI stack to a certificates-as-a-service vendor, getting a handle on our web PKI consumption, and making massive improvements to our certificate life-cycle management platform. I supported and advised our CyberSec and Desktop teams as we rolled out multi-factor authentication to 50,000 employees and contractors across the US. My understanding of deep computer fundamentals, talent for quickly grasping nuances of larger systems, and calmness in a crisis have contributed to quickly resolving major technology outages regardless of root cause.

This role hasn't been exclusively technical. A big part of my current job is building relationships with our developers to help them understand how certificates work, the responsible ways to use them, and what our relevant internal policies are. I've developed training and teaching material for junior and mid-level engineers featuring practical PKI concepts and our specific enterprise requirements. I've worked closely with fellow principal engineers and architects to design secure, resilient services. I've gotten to spend some time with upper management to both explain the immediate challenges we've had and the plans we can implement improve our infrastructure, reducing costs and outages.

While this position has been focused on certs and how to use them, I'm very comfortable considering a technical leadership role for Windows (server and desktop) administration and Active Directory. I also have some good experience with Azure and virtualization platforms, but they haven't been my daily focus for several years.

My current employer is direct retail for general public consumers. I've also worked in banking/finance, manufacturing, and architecture/civil engineering firms. The common thread is I love to help people leverage technology for their goals, to help them be more effective.

In my personnel/volunteer time I've done very similar: working backstage with lights/sounds/projections so live performers can shine, and volunteering at local repair clinic events to help my neighbors with technology that isn't meeting their expectations.

Right now I'm in Syracuse, New York (about five hours from NYC), but I'm open to relocation/migration anywhere in the world.

PMs open if you want to talk details. Boosts/retoots appreciated.

#Job #GetFediHired #FediHired #ITJobs #Windows #ActiveDirectory #Certificate #MSCA #MicrosoftCertificateAuthority #ADCS #PKI #WebPKI #Azure #Migration #CyberSecurity #InfoSecurity #RemoteWork

MedBridgeNZMedBridgeNZ
2025-12-11

The future of oncology is shifting. Our latest article explores the explosive rise of ADC cancer treatment in China—the "magic bullets" that Merck and AstraZeneca are spending billions to acquire.

MedBridgeNZ facilitates Medical Tourism China by connecting you directly with the top-tier hospitals pioneering these treatments.

Read more: zurl.co/G0Svk

benzogaga33 :verified:benzogaga33@mamot.fr
2025-11-21

AD CS : comment renouveler les certificats d’une autorité racine et intermédiaire ? it-connect.fr/ad-cs-comment-re #WindowsServer #ADCS

benzogaga33 :verified:benzogaga33@mamot.fr
2025-10-03
kriware :verified:kriware@infosec.exchange
2025-08-14

SCEP Request Tool for AD CS and Intune

A command-line SCEP client enabling certificate requests from AD CS/NDES and Intune during pentesting.

github.com/dirkjanm/scepreq

#ADCS

2025-07-23

📢 Guide de détection des attaques d'escalade de privilèges ADCS
📝 Cet article publié par Black Hills InfoSec fournit un guide complet pour les équipes de sécurité opérationnelle sur la détection des attaques d'escalade de privilèges...
📖 cyberveille : cyberveille.ch/posts/2025-07-2
🌐 source : blackhillsinfosec.com/detectin
#ADCS #Escalade_de_privilèges #Cyberveille

2025-07-17

ESCплуатация: новый вектор атаки на Active Directory Certificate Services

Привет, Хабр! По горячим следам нашей большой статьи про векторы атак ESC1-ESC15 мы — команда PT Cyber Analytics — решили подробно разобрать относительно новый вектор атаки ESC16. Возможность обнаружения и эксплуатации этого вектора была добавлена в майском обновлении ПО Certipy.

habr.com/ru/companies/pt/artic

#activedirectory #cybersecurity #пентест #certificate_authority #certificates #adcs #redteam #certipy

Industry ExaminerIndustryExaminer
2025-07-15

The EU just bet €12.5M on biotech firm Oncomatryx to lead in antibody-drug conjugates (ADCs) — a new frontier in cancer therapy. A bold move in Europe's push to shape the future of precision oncology.
🔗 biotech.industryexaminer.com/e

2025-06-25

A single misstep in AD CS can hand attackers the keys to your entire domain—no passwords needed.

If your team installed Active Directory Certificate Services more than six months ago, your organization could be at risk.

Watch our new 4-minute video to see how a default setting enables low-privilege users to escalate all the way to domain admin and what you can do to reduce your risk. youtu.be/S59dNEPnJ4M

#ActiveDirectory #Cybersecurity #PenetrationTesting #PrivilegeEscalation #ADCS #ITsecurity #infosec #CISO #DomainAdmin #NetworkSecurity #DFIR

Who Let The Dogs Out 🐾ashed@mastodon.ml
2025-06-20

#ad #adcs #privesc #pentest #redteam

Breaking ADCS: ESC1 to ESC16 Attack Techniques

Lab Environment: All examples in this article are demonstrated using the GOAD [Game of Active Directory](github.com/Orange-Cyberdefense) lab environment, which provides a realistic multi-domain Active Directory setup perfect for testing these techniques. The domains we'll be working with include `essos.local`, `sevenkingdoms.local`, and `north.sevenkingdoms.local`.

Whether you're a red teamer looking to expand your toolkit or a defender trying to understand these threats, this article will give you the deep technical knowledge you need.

xbz0n.sh/blog/adcs-complete-at

2025-06-09

Escплуатация. Повышение привилегий с использованием AD CS

Привет, Хабр! На связи команда PT Cyber Analytics. Мы взаимодействуем с этичными хакерами в различных red‑team‑проектах, реализуемых для наших заказчиков. Пока хакеры занимаются поиском уязвимых мест и различных недостатков в системах заказчиков, мы — аналитики — занимаемся комплексным анализом системы, оценкой уязвимостей и их последствий в контексте угрозы для заказчика, составляем список рекомендаций и мер и представляем все обнаруженное хакерами и проанализированное нами в форме понятных отчетов. В процессе работы над подобными проектами мы провели множество исследований инфраструктур и накопили знания о различных актуальных атаках — и хотим поделиться этими знаниями с экспертами или теми, кто просто заинтересован в информационной безопасности. Свою статью мы бы хотели начать с обсуждения атак, наиболее часто проводимых в рамках внутренних пентестов. Основная цель внутренних пентестов — получение контроля над инфраструктурой заказчика. Поскольку большая часть компаний использует Active Directory для построения сетей, то цель обычно достигается путем получения учетной записи администратора домена (или другой учетной записи с аналогичными привилегиями). С такими правами потенциальный нарушитель может сделать практически все что угодно: добраться до любой важной информации, зашифровать данные, вывести критически значимые системы из строя и т. п. Таким образом, получения подобной учетной записи в большинстве случаев достаточно для окончания работ и подтверждения успешности взлома внутренней сети. Есть множество способов добиться этой цели, один из них, и достаточно популярный, — проведение атак на службу сертификации Active Directory (AD CS).

habr.com/ru/companies/pt/artic

#cybersecurity #certificates #activedirectory #certificate_authority #certipy #adcs #пентест #redteam

benzogaga33 :verified:benzogaga33@mamot.fr
2025-04-24
kriware :verified:kriware@infosec.exchange
2025-03-20

Diving Into AD CS: Exploring Some Common Error Messages

This article delves into common error messages encountered when abusing Active Directory Certificate Services (AD CS).

sensepost.com/blog/2025/diving

#ActiveDirectory #ADCS

2024-12-18

If you are an Active Directory admin and have been saddled with running PKI long enough to have fun into implementation issues, Uwe Gradenegger has a great still relevant post on the limits of Active Directory Certificate Services. It is eye-opening and provides clarity on a lot of issues I've encountered understanding why ADCS is so... ADCS.
gradenegger.eu/en/limits-of-th

#activedirectory #pki #adcs #windows #sysadmin

2024-09-25

AD CS Web Enrollment. Relay меня полностью

В последнее время часто можно услышать, что атаки на ADCS стали чем-то тривиальным: после выхода информативной статьи Certified Pre-Owned от Specter Ops почти каждый пентестер знает, что такое ESC1 и ESC8, и, увидев в Cert Publishers компьютеры, сразу бежит туда. Однако Web Enrollment помимо атак может чейнить уязвимости и служить отличным вариантом для Initial Access. Разберемся, как его применять, на примере нашего проекта по инфраструктурному пентесту.

habr.com/ru/companies/jetinfos

#информационная_безопасность #пентест #activedirectory #adcs

Jote 🏳️‍🌈 :verified_gay:ailnoth@social.plux.wtf
2024-08-10

I'm 10 days into #vacation ... I have 20 days left. I think I need longer vacation as when I come back one of the things that are waiting for me is doing shit with #ADCS, setting up a new node and doing shit with templates. And I'm not in the mood at all.

#sysadmin #windows #server #techie #pki

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst