ADCS Attack Paths in BloodHound — Part 3
Tags
attack-pattern: | Authentication Attempt - T1381 Dns - T1071.004 Dns - T1590.002 Impersonation - T1656 Ntds - T1003.003 Server - T1583.004 Server - T1584.004 |
Common Information
Type | Value |
---|---|
UUID | 6a580cc6-7ad6-499f-9490-5199e9822b4d |
Fingerprint | fd315ada1e0fac94 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 11, 2024, 2:05 p.m. |
Added to db | Sept. 11, 2024, 4:25 p.m. |
Last updated | Nov. 17, 2024, 10:40 p.m. |
Headline | ADCS Attack Paths in BloodHound — Part 3 |
Title | ADCS Attack Paths in BloodHound — Part 3 |
Detected Hints/Tags/Attributes | 47/1/12 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 158 | ✔ | Malware Analysis, News and Indicators - Latest topics | https://malware.news/latest.rss | 2024-08-30 22:08 |
Details | 226 | ✔ | Security Boulevard | https://securityboulevard.com/feed | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 17 | cve-2022-26923 |
|
Details | Domain | 6 | domain.name |
|
Details | Domain | 369 | microsoft.com |
|
Details | Domain | 2 | dc01.dumpster.fire |
|
Details | File | 11 | certify.exe |
|
Details | File | 2 | computers.json |
|
Details | md5 | 1 | ac5d92bdf93b78523d64e08af7ad0027 |
|
Details | IPv4 | 56 | 1.3.6.1 |
|
Details | Microsoft Patch Numbers | 5 | KB5014754 |
|
Details | Url | 1 | https://medium.com/media/ac5d92bdf93b78523d64e08af7ad0027/href">https://medium.com/media/ac5d92bdf93b78523d64e08af7ad0027/href |
|
Details | Windows Registry Key | 2 | HKLM\System\CurrentControlSet\Services\Kdc |
|
Details | Windows Registry Key | 2 | HKLM\System\CurrentControlSet\Control\SecurityProviders\Schannel |