The PKI Blog

PKI Spotlight® now has over 90 Best Practice alerts with its latest release.

By Alex Bok | Jul 17, 2023
PKI Solutions Logo

PKI Spotlight now has over 90 Best Practice alerts with its latest release. The latest release of PKI Spotlight includes over 90 best practice alerts, representing a significant advancement in PKI management. These alerts further strengthen the platform’s ability to identify and address potential security weaknesses, ensuring the integrity and reliability of PKIs. By leveraging…

Read More

Digital Trust and IT Security: Empowering Your Organization 

By Josh Sommer | Jun 2, 2023

Digital Trust and IT Security: Empowering Your Organization  Finding a solution to Public Key Infrastructure (PKI) challenges is not always “one-size-fits all”. Tons of factors come into play, but one thing is certain: In today’s digital world, organizations of all sizes rely on PKI to ensure secure communication and protect critical business functions.   PKI acts…

Read More

Escalating from child domain’s admins to enterprise admins in 5 minutes by abusing AD CS, a follow up

By Vadims Podāns | May 25, 2023

Hello everyone, long time no see. I’m still extremely busy on my main job stuff, specifically PKI Spotlight commercial product development, so my blogging has slowed, and I’m here again! Prologue Disclaimer: This post contains steps and information that can lead to legal issues with your employer and lawsuits if you execute them in a…

Read More

Securing Active Directory Certificate Services: Protecting Your Digital Assets 

By Josh Sommer | May 19, 2023

Active Directory Certificate Services (ADCS) plays a crucial role in securing digital assets within organizations. However, even a single device can introduce vulnerabilities in the PKI (Public Key Infrastructure) environment. Understanding, implementing, and securing ADCS can be challenging, requiring organizations to proactively address potential risks. In this blog post, we will explore the risks associated…

Read More

Hungry, Hungry Hippos: Addressing Vulnerabilities in MS Active Directory Certificate Services

By Josh Sommer | Mar 30, 2023
PetitPotems-and-Baby-Hippos-Addressing-Vulnerabilities-in-MS-Active-Directory-Certificate-Services

The use of MS Active Directory Certificate Services (ADCS) is crucial for the secure operation of modern enterprises. However, it is vital to keep up with potential vulnerabilities that may arise within ADCS environments. This whitepaper highlights two critical vulnerabilities that affect ADCS environments and provides actionable steps to address them. Vulnerability 1: Man-in-the-Middle (MiTM)…

Read More

ADCS SID Extension Policy Module is live!

By Vadims Podāns | Mar 11, 2023

Hello everyone, here is my next blog post after a long delay. While I’m working on PKI Spotlight product, I never forget about open-source products and a lot was changed without much announces since the work is still in progress. Today I want to inform about my next effort and it is a big one.…

Read More

Protecting Public Key Infrastructure (PKI) Environments and Certificate Authorities (CAs) Against Password Fatigue and Authentication Risks: A Guide for Cybersecurity Professionals Using PKI Spotlight

By Josh Sommer | Mar 8, 2023
PKI Solutions MFA 2FA Multi Factor Authentication two factor authentication fatigue cybersecurity CA 3.8.23

Abstract  Public Key Infrastructure (PKI) and Certificate Authorities (CAs) play a crucial role in digital security, ensuring the authenticity and integrity of online communications. However, PKI and CA environments are vulnerable to various authentication risks, including password fatigue, which can compromise the security of an organization’s sensitive data. This guide provides insights into these risks…

Read More

Hidden switches of Certutil.exe and Certreq.exe

By ThePKIGuy | Mar 3, 2023

Hey Kids, Rock and Roll! Two of the most reliable toolsets in Windows for the last two decades have been the tandem of certutil.exe and certreq.exe. It’s no secret there are a wealth of very useful functions exposed in the basic usage of these tools, also documented publicly here: certutil.exe public documentation certreq.exe public documentation…

Read More

Gardening and Weeding Certificate Templates: Private Key Flags 

By Michael Bruno | Jan 18, 2023
Certificate Template Mismanagement Cybersecuroty Threat Risk Compliance Laws Regulations IT Insurance Risk Analysts and Audits

Mismanagement of certificate templates is one of the lowest of the low-hanging fruits when it comes to ADCS threat vectors. Among other things, a misconfigured certificate template can lead to a threat actor obtaining a certificate which could be used for privilege escalation up to and including Enterprise Administrator!  As you can imagine, it’s a…

Read More

1 Comment

  1. […] Solutions for their excellent posts on PKI in Active Directory, as well as their PSPKI PowerShell module, which our auditing toolkit is based […]