π§Cross-Forest Trust Abuse - from Linux
π― HTB Academy: Active Directory Enumeration & Attacks
π Overview
π« Cross-Forest Kerberoasting
Attack Methodology
Execution Workflow
SPN Enumeration
# Enumerate SPNs in trusted domain
impacket-GetUserSPNs -target-domain FREIGHTLOGISTICS.LOCAL INLANEFREIGHT.LOCAL/wley
# Expected output:
ServicePrincipalName Name MemberOf PasswordLastSet LastLogon Delegation
----------------------------------- -------- ------------------------------------------------------ -------------------------- --------- ----------
MSSQLsvc/sql01.freightlogstics:1433 mssqlsvc CN=Domain Admins,CN=Users,DC=FREIGHTLOGISTICS,DC=LOCAL 2022-03-24 15:47:52.488917 <never>TGS Ticket Extraction
Hash Cracking
π Foreign Group Membership Discovery
bloodhound-python Multi-Domain Collection
DNS Configuration Requirements
Data Collection Process
Data Packaging
π― HTB Academy Lab Solutions
Lab Environment Setup
π Question 1: "Kerberoast across the forest trust from the Linux attack host. Submit the name of another account with an SPN aside from MSSQLsvc."
π« Question 2: "Crack the TGS and submit the cleartext password as your answer."
ποΈ Question 3: "Log in to the ACADEMY-EA-DC03.FREIGHTLOGISTICS.LOCAL Domain Controller using the Domain Admin account password submitted for question #2 and submit the contents of the flag.txt file on the Administrator desktop."
β οΈ Attack Considerations
DNS Configuration Management
Cross-Domain Authentication
Password Reuse Assessment
π Key Takeaways
Cross-Platform Forest Attack Capability
Critical Success Factors
Professional Impact
Last updated