Academy

Module 6 Β· ADCS β€” ESC1 through ESC16 πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
4 min read

Active Directory Certificate Services (ADCS) is Microsoft’s enterprise PKI. It issues certificates for user authentication, server TLS, code signing, and SMIME. It’s deployed in most enterprises that use AD. In 2021, SpecterOps published “Certified Pre-Owned,” which catalogued eight attack paths against misconfigured ADCS β€” ESC1 through ESC8. Most of them remain findable in 2026 because the misconfigurations are operational defaults, not bugs.

Why ADCS is attack-rich

ADCS allows certificate templates to specify who can request what kind of cert for what purpose. Templates have:

  • Enroll permissions (who can request)
  • Application Policies (what the cert is used for β€” Client Authentication, Server Authentication, etc.)
  • Subject Alternate Name (SAN) options (whether the requester can supply arbitrary SAN)
  • Manager approval requirements
  • Cert lifetime

Small configuration errors enable privilege escalation. Specifically, if a template allows low-privilege users to enroll for Client Authentication certs with attacker-supplied SAN, the attacker can request a cert with Administrator’s name in the SAN and authenticate as Administrator.

The ESC catalog

Certified Pre-Owned catalogued 8 attack classes. Brief overview:

πŸ” Advanced Module Β· Pro Tier

Continue reading with Pro tier (β‚Ή4,999/year)

You've read 25% of this module. Unlock the remaining deep-dive, quiz, and every other Advanced/Expert module.

136+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
9 more sections locked below