Domain Trust Enumeration
Enumerate Domain Trusts (PowerView)
Show Existing Trusts
Show Trust Mapping
Show Users in the Child Domain
Attacking Domain Trusts - Child -> Parent (Windows)
To perform this attack after compromising a child domain, we need the following:
The KRBTGT hash for the child domain
The SID for the child domain
The name of a target user in the child domain (does not need to exist!)
The FQDN of the child domain.
The SID of the Enterprise Admins group of the root domain.
With this data collected, the attack can be performed with Mimikatz.
1 Obtaining KRBTGT NT Hash
2 Obtaining SID Child Domain
3 Name Target User
4 FQDN Child Domain
5 SID Enterprise Admins Group
6 Putting It All Together
7 Confirm Ticket
8 DCsync
Attacking Domain Trusts - Child -> Parent (Linux)
We can also perform the attack shown in the previous section from a Linux attack host. To do so, we'll still need to gather the same bits of information:
The KRBTGT hash for the child domain
The SID for the child domain
The name of a target user in the child domain (does not need to exist!)
The FQDN of the child domain
The SID of the Enterprise Admins group of the root domain
1 Get KRBTGT NT Hash
2 Get SID Child Domain
3 Name Target User
4 Get SID Enterprise Admins
5 Putting it all Together
6 Export ccache
7 Get Shell
Automatic Way
Attacking Domain Trust - Cross-Forest (Windows)
Cross-Forest Kerberoasting
Admin Password Reuse & Group Membership
SID History Abuse
![[Pasted image 20230428181936.png]]
Attacking Domain Trusts - Cross-Forest Trust Abuse (Linux)
Cross-Forest Kerberosting
Last updated