Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-26923 PoC — Active Directory Domain Services Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2022-26923)
Description:Active Directory Domain Services Elevation of Privilege Vulnerability
Description
Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services
Readme
# TryHackMe-CVE-2022-26923
Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services
# CVE-2022-26923
[TryHackMe | CVE-2022-26923](https://tryhackme.com/room/cve202226923)
## Task 1 Introduction
[Security Update Guide - Microsoft Security Response Center](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923)

[TryHackMe | Active Directory Basics](https://tryhackme.com/room/activedirectorybasics)

[Certified Pre-Owned. Active Directory Certificate Services… | by Will Schroeder | Posts By SpecterOps Team Members](https://posts.specterops.io/certified-pre-owned-d95910965cd2)

[TryHackMe | AD Certificate Templates](https://tryhackme.com/room/adcertificatetemplates)

[Oliver Lyak](https://twitter.com/ly4k_)

[Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923) | by Oliver Lyak | May, 2022 | IFCR](https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4)
## Task 2 A brief look at certificate templates
File Snapshot

[4.0K] /data/pocs/73f374835d374254353920f2a6fe0c2fb28a3db7 └── [1.0K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →