Domain Trust Enumeration

Enumerate Domain Trusts (PowerView)

Show Existing Trusts

Get-Domaintrust

Show Trust Mapping

Get-DomainTrustMapping

Show Users in the Child Domain

Get-DomainUser -Domain LOGISTICS.INLANEFREIGHT.LOCAL | select SamAccountName

Attacking Domain Trusts - Child -> Parent (Windows)

To perform this attack after compromising a child domain, we need the following:

  1. The KRBTGT hash for the child domain

  2. The SID for the child domain

  3. The name of a target user in the child domain (does not need to exist!)

  4. The FQDN of the child domain.

  5. The SID of the Enterprise Admins group of the root domain.

  6. With this data collected, the attack can be performed with Mimikatz.

1 Obtaining KRBTGT NT Hash

2 Obtaining SID Child Domain

3 Name Target User

4 FQDN Child Domain

5 SID Enterprise Admins Group

6 Putting It All Together

7 Confirm Ticket

8 DCsync

Attacking Domain Trusts - Child -> Parent (Linux)

We can also perform the attack shown in the previous section from a Linux attack host. To do so, we'll still need to gather the same bits of information:

  1. The KRBTGT hash for the child domain

  2. The SID for the child domain

  3. The name of a target user in the child domain (does not need to exist!)

  4. The FQDN of the child domain

  5. The SID of the Enterprise Admins group of the root domain

1 Get KRBTGT NT Hash

2 Get SID Child Domain

3 Name Target User

4 Get SID Enterprise Admins

5 Putting it all Together

6 Export ccache

7 Get Shell

Automatic Way

Attacking Domain Trust - Cross-Forest (Windows)

Cross-Forest Kerberoasting

Admin Password Reuse & Group Membership

SID History Abuse

![[Pasted image 20230428181936.png]]

Attacking Domain Trusts - Cross-Forest Trust Abuse (Linux)

Cross-Forest Kerberosting

Last updated