EXPLORE
← Back to Explore
T1553.004

Install Root Certificate

Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers. Root certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certificate is installed, the system or application will trust certificates in the root's chain of trust that have been signed by the root certificate.(Citation: Wikipedia Root Certificate) Certificates are commonly used for establishing secure TLS/...

LinuxmacOSWindows
15
Detections
3
Sources
0
Threat Actors

BY SOURCE

10sigma3elastic2splunk_escu

PROCEDURES (4)

Process Creation Monitoring7 detections

Auto-extracted: 7 detections for process creation monitoring

General Monitoring4 detections

Auto-extracted: 4 detections for general monitoring

Script Execution Monitoring3 detections

Auto-extracted: 3 detections for script execution monitoring

Registry Monitoring1 detections

Auto-extracted: 1 detections for registry monitoring

DETECTIONS (15)