Skip to content

Commit

Permalink
fix typos
Browse files Browse the repository at this point in the history
  • Loading branch information
JonasBK committed Sep 19, 2024
1 parent dc59075 commit 1e161c8
Show file tree
Hide file tree
Showing 10 changed files with 36 additions and 36 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -587,7 +587,7 @@ const LinuxAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> = (
return (
<>
<Typography variant='body2'>
With GenericAll permission over a root CA, you can make a rouge certificate trusted as a root CA
With GenericAll permission over a root CA, you can make a rogue certificate trusted as a root CA
in the AD forest by adding the certificate in the root CA object's cACertificate attribute. This
action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -598,7 +598,7 @@ const LinuxAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> = (
<>
<Typography variant='body2'>
With GenericAll permission over a NTAuth store, you can make an enterprise CA certificate
trusted for NT (domain) authentication the AD forest by adding the certificate in the root CA
trusted for NT (domain) authentication in the AD forest by adding the certificate in the root CA
object's cACertificate attribute. This action may enable you to perform an ADCS domain
escalation. This action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -609,7 +609,7 @@ const LinuxAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> = (
<>
<Typography variant='body2'>
With GenericAll permission over an issuance policy object, you create a OID group link to a
targeted group by adding the groups distinguishedName in the msDS-OIDToGroupLink attribute of
targeted group by adding the group's distinguishedName in the msDS-OIDToGroupLink attribute of
the issuance policy object. This action may enable you to gain membership of the group through
an ADCS ESC13 attack.
</Typography>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -723,7 +723,7 @@ const WindowsAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> =
return (
<>
<Typography variant='body2'>
With GenericAll permission over a root CA, you can make a rouge certificate trusted as a root CA
With GenericAll permission over a root CA, you can make a rogue certificate trusted as a root CA
in the AD forest by adding the certificate in the root CA object's cACertificate attribute. This
action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -734,7 +734,7 @@ const WindowsAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> =
<>
<Typography variant='body2'>
With GenericAll permission over a NTAuth store, you can make an enterprise CA certificate
trusted for NT (domain) authentication the AD forest by adding the certificate in the root CA
trusted for NT (domain) authentication in the AD forest by adding the certificate in the root CA
object's cACertificate attribute. This action may enable you to perform an ADCS domain
escalation. This action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -745,7 +745,7 @@ const WindowsAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> =
<>
<Typography variant='body2'>
With GenericAll permission over an issuance policy object, you create a OID group link to a
targeted group by adding the groups distinguishedName in the msDS-OIDToGroupLink attribute of
targeted group by adding the group's distinguishedName in the msDS-OIDToGroupLink attribute of
the issuance policy object. This action may enable you to gain membership of the group through
an ADCS ESC13 attack.
</Typography>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -310,7 +310,7 @@ const LinuxAbuse: FC<EdgeInfoProps> = ({ targetType }) => {
return (
<>
<Typography variant='body2'>
With GenericWrite permission over a root CA, you can make a rouge certificate trusted as a root
With GenericWrite permission over a root CA, you can make a rogue certificate trusted as a root
CA in the AD forest by adding the certificate in the root CA object's cACertificate attribute.
This action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -321,7 +321,7 @@ const LinuxAbuse: FC<EdgeInfoProps> = ({ targetType }) => {
<>
<Typography variant='body2'>
With GenericWrite permission over a NTAuth store, you can make an enterprise CA certificate
trusted for NT (domain) authentication the AD forest by adding the certificate in the root CA
trusted for NT (domain) authentication in the AD forest by adding the certificate in the root CA
object's cACertificate attribute. This action may enable you to perform an ADCS domain
escalation. This action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -332,7 +332,7 @@ const LinuxAbuse: FC<EdgeInfoProps> = ({ targetType }) => {
<>
<Typography variant='body2'>
With GenericWrite permission over an issuance policy object, you create a OID group link to a
targeted group by adding the groups distinguishedName in the msDS-OIDToGroupLink attribute of
targeted group by adding the group's distinguishedName in the msDS-OIDToGroupLink attribute of
the issuance policy object. This action may enable you to gain membership of the group through
an ADCS ESC13 attack.
</Typography>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -371,7 +371,7 @@ const WindowsAbuse: FC<EdgeInfoProps> = ({ sourceName, sourceType, targetName, t
return (
<>
<Typography variant='body2'>
With GenericWrite permission over a root CA, you can make a rouge certificate trusted as a root
With GenericWrite permission over a root CA, you can make a rogue certificate trusted as a root
CA in the AD forest by adding the certificate in the root CA object's cACertificate attribute.
This action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -382,7 +382,7 @@ const WindowsAbuse: FC<EdgeInfoProps> = ({ sourceName, sourceType, targetName, t
<>
<Typography variant='body2'>
With GenericWrite permission over a NTAuth store, you can make an enterprise CA certificate
trusted for NT (domain) authentication the AD forest by adding the certificate in the root CA
trusted for NT (domain) authentication in the AD forest by adding the certificate in the root CA
object's cACertificate attribute. This action may enable you to perform an ADCS domain
escalation. This action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -393,7 +393,7 @@ const WindowsAbuse: FC<EdgeInfoProps> = ({ sourceName, sourceType, targetName, t
<>
<Typography variant='body2'>
With GenericWrite permission over an issuance policy object, you create a OID group link to a
targeted group by adding the groups distinguishedName in the msDS-OIDToGroupLink attribute of
targeted group by adding the group's distinguishedName in the msDS-OIDToGroupLink attribute of
the issuance policy object. This action may enable you to gain membership of the group through
an ADCS ESC13 attack.
</Typography>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -704,7 +704,7 @@ const LinuxAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> = (
<>
<Typography variant='body2'>
With ownership over a root CA, you can grant yourself GenericAll. With GenericAll, you can make
a rouge certificate trusted as a root CA in the AD forest by adding the certificate in the root
a rogue certificate trusted as a root CA in the AD forest by adding the certificate in the root
CA object's cACertificate attribute. This action may enable you to perform an ADCS domain
escalation.
</Typography>
Expand All @@ -715,9 +715,9 @@ const LinuxAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> = (
<>
<Typography variant='body2'>
With ownership over a NTAuth store, you can grant yourself GenericAll. With GenericAll, you can
make an enterprise CA certificate trusted for NT (domain) authentication the AD forest by adding
the certificate in the root CA object's cACertificate attribute. This action may enable you to
perform an ADCS domain escalation. This action may enable you to perform an ADCS domain
make an enterprise CA certificate trusted for NT (domain) authentication in the AD forest by
adding the certificate in the root CA object's cACertificate attribute. This action may enable
you to perform an ADCS domain escalation. This action may enable you to perform an ADCS domain
escalation.
</Typography>
</>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -947,7 +947,7 @@ const WindowsAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> =
<>
<Typography variant='body2'>
With ownership over a root CA, you can grant yourself GenericAll. With GenericAll, you can make
a rouge certificate trusted as a root CA in the AD forest by adding the certificate in the root
a rogue certificate trusted as a root CA in the AD forest by adding the certificate in the root
CA object's cACertificate attribute. This action may enable you to perform an ADCS domain
escalation.
</Typography>
Expand All @@ -958,9 +958,9 @@ const WindowsAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> =
<>
<Typography variant='body2'>
With ownership over a NTAuth store, you can grant yourself GenericAll. With GenericAll, you can
make an enterprise CA certificate trusted for NT (domain) authentication the AD forest by adding
the certificate in the root CA object's cACertificate attribute. This action may enable you to
perform an ADCS domain escalation. This action may enable you to perform an ADCS domain
make an enterprise CA certificate trusted for NT (domain) authentication in the AD forest by
adding the certificate in the root CA object's cACertificate attribute. This action may enable
you to perform an ADCS domain escalation. This action may enable you to perform an ADCS domain
escalation.
</Typography>
</>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -700,7 +700,7 @@ const LinuxAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> = (
<>
<Typography variant='body2'>
With WriteDacl permission over a root CA, you can grant yourself GenericAll. With GenericAll,
you can make a rouge certificate trusted as a root CA in the AD forest by adding the certificate
you can make a rogue certificate trusted as a root CA in the AD forest by adding the certificate
in the root CA object's cACertificate attribute. This action may enable you to perform an ADCS
domain escalation.
</Typography>
Expand All @@ -711,10 +711,10 @@ const LinuxAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> = (
<>
<Typography variant='body2'>
With WriteDacl permission over a NTAuth store, you can grant yourself GenericAll. With
GenericAll, you can make an enterprise CA certificate trusted for NT (domain) authentication the
AD forest by adding the certificate in the root CA object's cACertificate attribute. This action
may enable you to perform an ADCS domain escalation. This action may enable you to perform an
ADCS domain escalation.
GenericAll, you can make an enterprise CA certificate trusted for NT (domain) authentication in
the AD forest by adding the certificate in the root CA object's cACertificate attribute. This
action may enable you to perform an ADCS domain escalation. This action may enable you to
perform an ADCS domain escalation.
</Typography>
</>
);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -891,7 +891,7 @@ const WindowsAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> =
<>
<Typography variant='body2'>
With WriteDacl permission over a root CA, you can grant yourself GenericAll. With GenericAll,
you can make a rouge certificate trusted as a root CA in the AD forest by adding the certificate
you can make a rogue certificate trusted as a root CA in the AD forest by adding the certificate
in the root CA object's cACertificate attribute. This action may enable you to perform an ADCS
domain escalation.
</Typography>
Expand All @@ -902,10 +902,10 @@ const WindowsAbuse: FC<EdgeInfoProps & { targetId: string; haslaps: boolean }> =
<>
<Typography variant='body2'>
With WriteDacl permission over a NTAuth store, you can grant yourself GenericAll. With
GenericAll, you can make an enterprise CA certificate trusted for NT (domain) authentication the
AD forest by adding the certificate in the root CA object's cACertificate attribute. This action
may enable you to perform an ADCS domain escalation. This action may enable you to perform an
ADCS domain escalation.
GenericAll, you can make an enterprise CA certificate trusted for NT (domain) authentication in
the AD forest by adding the certificate in the root CA object's cACertificate attribute. This
action may enable you to perform an ADCS domain escalation. This action may enable you to
perform an ADCS domain escalation.
</Typography>
</>
);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -770,7 +770,7 @@ const LinuxAbuse: FC<EdgeInfoProps & { haslaps: boolean }> = ({ sourceName, targ
<>
<Typography variant='body2'>
With WriteOwner permission on a root CA, you can grant yourself ownership over the object to
then grant yourself GenericAll. With GenericAll, you can make a rouge certificate trusted as a
then grant yourself GenericAll. With GenericAll, you can make a rogue certificate trusted as a
root CA in the AD forest by adding the certificate in the root CA object's cACertificate
attribute. This action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -782,7 +782,7 @@ const LinuxAbuse: FC<EdgeInfoProps & { haslaps: boolean }> = ({ sourceName, targ
<Typography variant='body2'>
With WriteOwner permission on a NTAuth store, you can grant yourself ownership over the object
to then grant yourself GenericAll. With GenericAll, you can make an enterprise CA certificate
trusted for NT (domain) authentication the AD forest by adding the certificate in the root CA
trusted for NT (domain) authentication in the AD forest by adding the certificate in the root CA
object's cACertificate attribute. This action may enable you to perform an ADCS domain
escalation. This action may enable you to perform an ADCS domain escalation.
</Typography>
Expand All @@ -794,7 +794,7 @@ const LinuxAbuse: FC<EdgeInfoProps & { haslaps: boolean }> = ({ sourceName, targ
<Typography variant='body2'>
With WriteOwner permission on an issuance policy object, you can grant yourself ownership over
the object to then grant yourself GenericAll. With GenericAll, you create a OID group link to a
targeted group by adding the groups distinguishedName in the msDS-OIDToGroupLink attribute of
targeted group by adding the group's distinguishedName in the msDS-OIDToGroupLink attribute of
the issuance policy object. This action may enable you to gain membership of the group through
an ADCS ESC13 attack.
</Typography>
Expand Down
Loading

0 comments on commit 1e161c8

Please sign in to comment.