1.What are the preconditions for exploiting a misconfigured certificate template according to the lesson?
2.Why does the lesson say the CA is 'not being exploited' in this attack?
3.What does the attacker gain by exploiting a misconfigured certificate template?
4.How does the lesson say this technique typically fits in an attack chain?
5.According to the lesson's commonWeakAnswers, why is saying 'this is an ESC1' insufficient when explaining this technique?