activedirectory Common ADCS Vulnerabilities: Logging, Exploitation, and Investigation - Part 2 In part 2, we investigate different scenarios and how to identify malicious users from a defensive standpoint.
adcs Common ADCS Vulnerabilities: Logging, Exploitation, and Investigation - Part 1 In a two-part series, we look at Active Directory Certificate Services (ADCS), how to stand up a lab environment and logging from a defensive standpoint.