Added a new certificate-based privilege escalation technique (ECS14-E… #1030
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Dear Maintainers,
Hello, I have learned a lot from HackTricks, and I would like to contribute to the project to help more people benefit from it. Due to my limited English proficiency, please forgive any grammar mistakes and give me a chance to improve them.
This PR primarily updates the domain-escalation.md document in the windows-hardening/active-directory-methodology/ad-certificates section. It introduces additional ADCS exploitation techniques (ECS14–ECS16), or at a minimum, guides readers to resources where they can quickly learn and understand these methodologies.
Due to language barriers, I have referenced some parts directly from the original articles. However, I made sure that all content is legitimate to quote, and I clearly indicated the sources.
Thank you for your time and consideration.
Best regards