๐ ๏ธTrust Attacks
Enumeration
Import-Module activedirectory
Get-ADTrust -Filter *Import-Module .\Powerview.ps1
Get-DomainTrust
Get-DomainTrustMappingChecking Users in the Child Domain using Get-DomainUser
Get-DomainUser -Domain LOGISTICS.INLANEFREIGHT.LOCAL | select SamAccountNameUsing netdom to query domain trust
netdom query /domain:inlanefreight.local trustUsing netdom to query domain controllers
netdom query /domain:inlanefreight.local dcUsing netdom to query workstations and servers
netdom query /domain:inlanefreight.local workstationAttacking Domain Trust Child - Parent Trust from Windows
SID History Primer
Extra SID - Mimikatz
Extra-Sid Attack - Rubeus
Performing a DCSync Attack
Attacking Domain Trust Child - Parent Trust from Linux
Performing DCSync using secretsdump.py in Child
Performing SID Burte Forcing using lookupsid.py
Looking for the Domain SID
Grabbing the Domain SID & Attaching to Enterprise Admin's RID
Constructing a Golden Ticket using ticketer.py
Performing the Attack with raiseChild.py
Attacking Domain Trusts - Cross-Forest Trust Abuse - from Windows
Cross-Forest Kerberoasting
Admin Password Re-Use & Group Membership
Attacking Domain Trusts - Cross-Forest Trust Abuse - from Linux
Cross-Forest Kerberoasting
Last updated