There is a lot of buzz around the exploits of ADCS, which there is good reason. However, most are not aware of two important aspects. There are actually 10 escalations! Yes, there are 10 different escalation paths. Second, there are also many different combinations of issues that make the exploit possible. Thus, remediation can also be very simple, if you know what to look for and how to fix it. Ideally you can do this with a spreadsheet or even Word. However, that is not the case. You really need to use a tool. We will use Bloodhound to look into how this is done with analytics. This is a free solution, so don't fret! In this session, 21 times Microsoft MVP Derek Melber will give you a complete view of the ADCS issue, with a breakdown of how you can quickly determine if you are susceptible to the attack and if you are, how you can remediate it! When you are done with this session, you will be able to protect yourself from this attack and keep your ADCS running!
You will learn:
- About the multitude of Escalation paths
- See how to secure your ADCS environment
- Understand how attackers leverage weak ADCS configurations