Abusing inter-forest trust
Since a forest is a security boundary, we can only access domain services that have been shared with the domain we have compromised (our source domain). Use e.g. BloodHound to look for users that have an account (with the same username) in both forests and try password re-use. Additionally, we can use BloodHound or PowerView to hunt for foreign group memberships between forests. The PowerView command:
To impersonate a user from our source domain to access services in a foreign domain, we can do the following.
Obtaining the domain trust key:
Use Mimikatz to generate a TGT for the target domain using the trust key:
Then, use Rubeus to ask a TGS for e.g. the CIFS service on the target DC using this TGT.
Last updated