jsdhasfeds
jsdhasfeds
Hi. I am trying to exploit scenario ESC6 using Kali only. To be clear, the CA "adlab-SERVER2-CA" has the flag "EDITF_ATTRIBUTESUBJECTALTNAME2" enabled and the service "certsvc" has been restarted. This...
Hi. Thank you very much for your time writing this tool! I can successfully add shadow credentials when authenticating using a plaintext password but when I try the same using...
Hi, Thank you for your effort! When I try this against Exchange 2019 CU 8 (which is vulnerable), the exploit seem to work up to the point "[Stage 4] Dealing...
Hi. Thank you very much for your effort that went into all this research! I am trying to abuse ESC6 from a non domain-joined machine. I am aware of the...