<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AD-CS on Aditya Telange</title><link>https://adityatelange.in/tags/ad-cs/</link><description>Recent content in AD-CS on Aditya Telange</description><image><title>Aditya Telange</title><url>https://adityatelange.in/assets/tn.jpg</url><link>https://adityatelange.in/assets/tn.jpg</link></image><generator>Hugo -- 0.156.0</generator><language>en</language><copyright>2020 - 2026 Aditya Telange</copyright><lastBuildDate>Sun, 06 Jul 2025 19:50:00 +0530</lastBuildDate><atom:link href="https://adityatelange.in/tags/ad-cs/index.xml" rel="self" type="application/rss+xml"/><item><title>HackTheBox (HTB) - Escape</title><link>https://adityatelange.in/writeups/hackthebox/escape/</link><pubDate>Sun, 06 Jul 2025 19:50:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/escape/</guid><description>Escape is a medium-difficulty Windows machine on Hack The Box that revolves around Active Directory. The initial foothold is gained by finding credentials in a PDF file on an open SMB share. This access is then leveraged to connect to an MSSQL service, from which we capture and crack the NTLM hash of a service account. Lateral movement is achieved by discovering another user&amp;rsquo;s credentials in a log file. Finally, privilege escalation to Administrator is accomplished by exploiting a misconfiguration in Active Directory Certificate Services (ADCS), specifically the ESC1 vulnerability.</description></item><item><title>HackTheBox (HTB) - Certified</title><link>https://adityatelange.in/writeups/hackthebox/certified/</link><pubDate>Thu, 20 Mar 2025 20:40:31 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/certified/</guid><description>&lt;code&gt;Certified&lt;/code&gt; is a Windows machine having misconfigured ACL in Active Directory environment where initial access for a low-privileged user &lt;code&gt;judith.mader&lt;/code&gt; is provided. Exploitation of the Active Directory Certificate Service (ADCS) is required to get access to the &lt;code&gt;management_svc&lt;/code&gt;, &lt;code&gt;ca_operator&lt;/code&gt; and &lt;code&gt;Administrator&lt;/code&gt; account by abusing shadow credentials and &lt;code&gt;ESC9&lt;/code&gt;.</description></item></channel></rss>