PKI
Protecting Public Key Infrastructure (PKI) Environments and Certificate Authorities (CAs) Against Password Fatigue and Authentication Risks: A Guide for Cybersecurity Professionals Using PKI Spotlight
Abstract Public Key Infrastructure (PKI) and Certificate Authorities (CAs) play a crucial role in digital security, ensuring the authenticity and integrity of online communications. However, PKI and CA environments are vulnerable to various authentication risks, including password fatigue, which can compromise the security of an organization’s sensitive data. This guide provides insights into these risks…
Read MoreHidden switches of Certutil.exe and Certreq.exe
Hey Kids, Rock and Roll! Two of the most reliable toolsets in Windows for the last two decades have been the tandem of certutil.exe and certreq.exe. It’s no secret there are a wealth of very useful functions exposed in the basic usage of these tools, also documented publicly here: certutil.exe public documentation certreq.exe public documentation…
Read MoreGardening and Weeding Certificate Templates: Private Key Flags
Mismanagement of certificate templates is one of the lowest of the low-hanging fruits when it comes to ADCS threat vectors. Among other things, a misconfigured certificate template can lead to a threat actor obtaining a certificate which could be used for privilege escalation up to and including Enterprise Administrator! As you can imagine, it’s a…
Read MorePKI Threat Detection and Recon: Code Signing – “The Signed Back Door” Webinar
Below are the key highlights, Q&A from our PKI Solutions “Office Hours”: The PKI Threat Detection and Recon: Code Signing Episode While our focus was on default check boxes and PKI misconfigurations, which can give adversaries access to a code signing certificate or they can just create their own, we touched on may topics. Presenter…
Read MorePKI Threat Detection and Recon: Code Signing – “The Signed Back Door” & Voldemort
Join us for an hour of Live Q&A at our PKI Solutions “Office Hours.” – The PKI Threat Detection and Recon: Code Signing – “The Signed Back Door” & Voldemort Episode A default check box or a PKI misconfiguration can give adversaries access to a code signing certificate or they can just create their own.…
Read More