Trust Enumeration and Attacks
Cross Forest Attacks Concepts
Enumeration
#Powershell Cmdlet
PS C:\htb> Import-Module activedirectory
PS C:\htb> Get-ADTrust -Filter *
#Powerview
PS C:\htb> Get-DomainTrust
PS C:\htb> Get-DomainTrustMappingAutomatic tools
Intra Forest Attacks
Unconstrained Delegation (Printer Bug - Child to Parent)
Configuration Naming Context (NC)
Abusing ADCS - Make Template vulnerable to ESC1 to privilege escalation (Child -> Parent)
Create a new Console on mmc and add Certificate Template

Make Template Vulnerable to ESC1
Grants Full control to SYSTEM

Add the malicious template to PKIEnrollmentService

GPO On Site Attack Across Trust (Child -> Parent)

GoldenGMSA Attack Across Trust (Child -> Parent)
Performing the Online Attack (Online Computation)
Performing the Offline Attack (Offline Computation)
DNS Wildcard Injection
Arbitrary DNS Record Modification from Child Domain
Password AttacksKerberoasting cross forest
Asreproasting cross forest
Cross Forest Attacks
Trust Account Attack
Unconstrained Delegation Cross Forest (DomainA > DomainB)
SID History Injection Attack
Case #1 High Privileged Migrated User
Case-2: Low Privileged Migrated User
SID Filter Bypass (CVE-2020-0665)
Be on the Trusting Forest
Attack Requirements for CVE-2020-0665
Collect
Value
Tool
Next step is convert the SID to binary
Updating SID Values in frida_intercept.py
Before to modify
Run the attack
After modification
Create Golden ticket:
Abusing SQL Server Links and Trustworthy Databases
[1433] MSSQLAbusing PAM Trusts
Last updated