27.Attacking Domain Trusts - Cross-Forest Trust Abuse - from Windows
I. Cross-Forest Kerberoasting
Concept: Performing Kerberoasting across domain trusts to obtain credentials for accounts in other domains.
Steps:
Enumerate SPNs:
Use PowerView:
Verify account privileges:
Use PowerView:
Perform Kerberoasting:
Use Rubeus with the
/domain:
flag:
Crack the hash:
Use Hashcat to crack the obtained hash.
Key Takeaway:
Exploiting trusts to gain access to privileged accounts in other domains.
II. Admin Password Re-Use & Group Membership
Password Re-Use:
Checking for password reuse across domains with bidirectional trusts.
If an attacker gains credentials in one domain, they might work in another.
Group Membership:
Enumerating foreign group memberships to find accounts with cross-domain privileges.
Commands:
Verify Access:
Key Takeaway:
Exploiting weak password management and misconfigured group memberships.
III. SID History Abuse - Cross Forest
Concept:
Abusing SID history across forest trusts when SID filtering is not enabled.
Allows accounts to retain privileges from their original domain after migration.
Mechanism:
Adding SIDs from one forest to the
sidHistory
attribute of accounts in another.The user retains the rights of the added SID in their token.
Key Takeaway:
Exploiting misconfigurations in trust relationships to maintain or gain privileges.
IV. Important Considerations:
Cross-forest attacks can significantly expand an attacker's reach.
Enumeration and verification are crucial steps.
Password reuse is a very common issue.
SID filtering is very important to have enabled.
Last updated