adcs-certipy-attack

Fail

Audited by Socket on May 9, 2026

1 alert found:

Malware
MalwareHIGH
references/esc-techniques.md

This fragment is highly indicative of malicious intent: it is an end-to-end ADCS exploitation and persistence playbook. It provides explicit operational steps to abuse certificate templates and CA policy, perform NTLM relay to ADCS Web Enrollment/RPC enrollment, authenticate with obtained or forged certificates, extract NTLM hashes and perform DCSync/secrets dumping on a domain controller, and establish durable access by forging certificates with CA private key material. If included in any software supply-chain artifact, it represents an extreme security risk.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
May 9, 2026, 08:28 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fadcs-certipy-attack%2F@a36dfb31d557f8515a01acb515e63ace3c18a063