Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-26923 PoC — Microsoft Windows Active Directory 信任管理问题漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Active Directory 信任管理问题漏洞 (CVE-2022-26923)
Description:Microsoft Windows Active Directory是美国微软(Microsoft)公司的一个负责架构中大型网络环境的集中式目录管理服务。存储有关网络上对象的信息,并使管理员和用户可以轻松查找和使用这些信息。 Microsoft Windows Active Directory存在信任管理问题漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Syst
Description
Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services
Readme
# TryHackMe-CVE-2022-26923
Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services
# CVE-2022-26923
[TryHackMe | CVE-2022-26923](https://tryhackme.com/room/cve202226923)
## Task 1 Introduction
[Security Update Guide - Microsoft Security Response Center](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923)

[TryHackMe | Active Directory Basics](https://tryhackme.com/room/activedirectorybasics)

[Certified Pre-Owned. Active Directory Certificate Services… | by Will Schroeder | Posts By SpecterOps Team Members](https://posts.specterops.io/certified-pre-owned-d95910965cd2)

[TryHackMe | AD Certificate Templates](https://tryhackme.com/room/adcertificatetemplates)

[Oliver Lyak](https://twitter.com/ly4k_)

[Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923) | by Oliver Lyak | May, 2022 | IFCR](https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4)
## Task 2 A brief look at certificate templates
File Snapshot

[4.0K] /data/pocs/73f374835d374254353920f2a6fe0c2fb28a3db7 └── [1.0K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.