BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.troopers.de//tr26-cfp//talk//WDATRC
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-tr26-cfp-WDATRC@cfp.troopers.de
DTSTART;TZID=CET:20260624T110000
DTEND;TZID=CET:20260624T120000
DESCRIPTION:The Active Directory Certificate Service (ADCS) has been studie
 d extensively\, which lead to an entire category of privilege escalation t
 echniques: the ESC attacks.\nWe combined known research about attacks on A
 DCS and the Windows Server Update Service (WSUS) to compromise Windows mac
 hines in supposedly "secure" environments.\nAs this technique can be gener
 alized\, we decided to introduce the new escalation number ESC17.
DTSTAMP:20260510T030639Z
LOCATION:Track 2
SUMMARY:ESC17: Using ADCS to Attack HTTPS-Enabled WSUS Clients - Alexander 
 Neff\, Phil Knüfer
URL:https://cfp.troopers.de/tr26-cfp/talk/WDATRC/
END:VEVENT
END:VCALENDAR
