Skip to main content
banner image
venafi logo

PKI Bootcamp: Anatomy of a Certificate Attack

PKI Bootcamp: Anatomy of a Certificate Attack

anatomy of a certificate attack
March 15, 2017 | Paul Turner

Certificates serve as the primary credentials used to identify systems and applications inside and outside organizations.

Because of this, certificates and the public key infrastructure (PKI) that supports them are attractive targets for attackers, especially if they can exploit poor management and security practices. In the video below, we look at several possible paths an attacker can follow in a kill chain, starting by exploiting bad management practices to using a stolen private key or rogue certificate in an attack to achieving their ultimate objective.

How prevalent are certificate related outages? We asked global CIOs.




In later blogs, we’ll elaborate on some of the bad management practices that provide attackers the openings their need to exploit these trusted credentials and best practices for closing these potential threat vectors. Read my next blog to learn more about how attackers get access to rogue certificates. 


Learn more about machine identity management. Explore now.

Like this blog? We think you will love this.
Featured Blog

Exposed TLS Certificates Force PKI Lead to Quit: How Badly Managed PKI Poses Serious Risk [Case Study]

'I'm out of here' — PKI lead  That’s th

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

Subscribe Now

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Paul Turner
Paul Turner

Paul Turner is Head of Services at Epuio. His extensive background in the Security industry, most recently in PKI and SSH, enable him to help large enterprises successfully manage their keys and certificates.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more