Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
The Cyber Threat Perspective - Episode 57: Find and FIX AD CS Vulnerabilities Using Locksmith with Jake and Sam

Episode 57: Find and FIX AD CS Vulnerabilities Using Locksmith with Jake and Sam

09/06/23 • 38 min

The Cyber Threat Perspective

In this episode we talk all about Active Directory Certificate Services and a free tool designed to help find and fix AD CS misconfigurations called Locksmith. Jake Hildreth (Mastodon: @[email protected]) the creator of Locksmith together with Sam Erde (Twitter: @SamErde) and myself (who are contributors to the project) chat about the inception of Locksmith and some of the awesome features, such as remediation snippets.
Invoke-Locksmith today!
https://github.com/TrimarcJake/Locksmith

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks

Work with Us: https://securit360.com

plus icon
bookmark

In this episode we talk all about Active Directory Certificate Services and a free tool designed to help find and fix AD CS misconfigurations called Locksmith. Jake Hildreth (Mastodon: @[email protected]) the creator of Locksmith together with Sam Erde (Twitter: @SamErde) and myself (who are contributors to the project) chat about the inception of Locksmith and some of the awesome features, such as remediation snippets.
Invoke-Locksmith today!
https://github.com/TrimarcJake/Locksmith

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks

Work with Us: https://securit360.com

Previous Episode

undefined - Episode 56: Vulnerabilities & Severity - Explain It To Me Like I'm 5

Episode 56: Vulnerabilities & Severity - Explain It To Me Like I'm 5

In this episode, Brad and Spencer talk about how vulnerabilities are assigned severity ratings, why they are important, how they are not perfect and why you should not rely on severity ratings alone to determine risk.

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks

Work with Us: https://securit360.com

Next Episode

undefined - Episode 58: How To Identify and Mitigate Insecure Windows Services

Episode 58: How To Identify and Mitigate Insecure Windows Services

In this episode, we're talking about How To Identify and Mitigate Insecure Windows Services. This is a very common issue we see on internal pentests. So much so that day 1 of our internal pentests revolves around evaluating the security and configuration of the endpoint to identify these issues. But this is only the tip of the ice burg.
https://offsec.blog/hidden-danger-how-to-identify-and-mitigate-insecure-windows-services/

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks

Work with Us: https://securit360.com

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/the-cyber-threat-perspective-228427/episode-57-find-and-fix-ad-cs-vulnerabilities-using-locksmith-with-jak-33229003"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to episode 57: find and fix ad cs vulnerabilities using locksmith with jake and sam on goodpods" style="width: 225px" /> </a>

Copy