🦦
Otter's Notes
Ctrlk
  • Introduction
  • Articles
    • Dumping data from the Microsoft Recall folder
    • Gaining persistence on Windows with Time Providers
    • Reverse engineering LSASS to decrypt DPAPI keys
    • Intro to Hypervisor Implants
    • In-depth Windows Telemetry
  • Notes
    • Active Directory
    • AAD
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
      • Introduction to ADCS
      • ESC1
      • ESC2
      • ESC3
      • ESC4
      • ESC5
      • ESC6
      • ESC7
      • ESC8
      • ESC9
      • ESC10
      • ESC11
      • Certificate Mapping
    • PowerShell
    • AWS
    • Binary Exploitation
    • Kernel Development
Powered by GitBook
On this page
  1. Notes
  2. ADCS

ESC11

PreviousESC10NextCertificate Mapping