Blue/Red Team question: does anyone have an observed example of an someone using x509 certs as part of their offensive tactics, beyond data encryption that is?

Iโ€™m putting together a talk on x509 certs and want to cover some historic examples of offensive usages in either red team or bad actor operations.

Please boost for distribution if possible

@turbo this sounds like it will be a cool talk ๐Ÿ‘

@ropman76 Thanks! The talk is gonna be about using mTLS as a C2 channel where the coms payload is embedded in x509 certs.

But I also wanted to give a bit of overview of other ways people have used x509 certs as part of their offensive tactics

Here is the link to my talk:
https://cyphercon.com/presentation/secret-handshake-a-mutual-tls-based-c2-communication-channel/

Secret Handshake: A Mutual TLS Based C2 Communication Channel โ€“ CypherCon

@turbo cool. I will be able to catch your talk in person ๐Ÿ‘๐Ÿ˜Š
@turbo share the talk once itโ€™s done please!
@goldbe will do! Hopefully it wonโ€™t suck ๐Ÿ˜‚
Ops Track 01/30/19 - Briefing on Dec 18 - Jan 19 DNS/IMAP Prepositioning Attacks - Bill Woodcock

YouTube
One-stop counterfeit certificate shops for all your malware-signing needs

Certificates registered in names of real corporations are surprisingly easy to come by.

Ars Technica
@turbo for several years, it was quite easy to smuggle in arbitrary payloads in X.509 certs against servers using GnuTLS. https://www.openldap.org/lists/openldap-devel/200802/msg00072.html
GnuTLS considered harmful