Skip to content

Commit 679e5c6

Browse files
authored
Update domain-persistence.md
1 parent f1d5c57 commit 679e5c6

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

src/windows-hardening/active-directory-methodology/ad-certificates/domain-persistence.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,8 @@ Set-ADUser -Identity 'victim' -Add @{altSecurityIdentities=$Map}
6363
```
6464

6565
Notes
66-
- If you can craft forged certificates that include the SID security extension, those will map implicitly even under Full Enforcement. Otherwise, prefer explicit strong mappings. See {{#ref}}account-persistence.md{{#endref}} for more on explicit mappings.
66+
- If you can craft forged certificates that include the SID security extension, those will map implicitly even under Full Enforcement. Otherwise, prefer explicit strong mappings. See
67+
[account-persistence](account-persistence.md) for more on explicit mappings.
6768
- Revocation does not help defenders here: forged certificates are unknown to the CA database and thus cannot be revoked.
6869

6970
## Trusting Rogue CA Certificates - DPERSIST2

0 commit comments

Comments
 (0)