cross-domain/forest attacks
Trust Attributes:
- 1024: PAM/PIM trsut
- 1096: PAM + ExternalTrust + ForestTransitive
use AD CS with enterprise admin name
use unconstrained delegation
- need rubeus on computer with unconstrained delegation
- use print-nightmare to extract ticket (DC$ of parent domain)
- use dcsync to gain admin hash or krbtgt
domain trust keys
- with mimikatz perform
lsadump::trust /patch
- search for [ In ] external-domain to owned-domain
- copy rc4_hmac_nt
from an admin shell:
create an inter-realm TGT with sid-history set to enterprise admin
From an admin shell:
alternatively:
check if there’s an SID > 1000 in the other forest to bypass sid filtering
kerberoast trusting domains
constrained delegation in trusting domain
abuse interesting cross-forest ACLs
enumerate FSPs
- only works for domain local groups (e.g., Administrators)
enumerate groups?
enumerate users?
on bastion-dc:
And on the student machine:
now directly connect through IP (as production.local has no DNS record):