🌲Cross-Forest Trust Abuse - from Windows

🎯 HTB Academy: Active Directory Enumeration & Attacks

πŸ“ Overview

Cross-Forest Trust Abuse exploits bidirectional forest trust relationships to expand attack scope beyond the initial compromise domain. These techniques leverage trust authentication flows to perform attacks like Kerberoasting, identify administrative privilege overlap, and abuse foreign group memberships for lateral movement across forest boundaries.


🎫 Cross-Forest Kerberoasting

Attack Methodology

  • Trust requirement: Bidirectional or inbound forest trust

  • Target identification: SPNs in trusted domains

  • Execution scope: Kerberos ticket requests across trust boundaries

  • Goal: Crack service account hashes for privileged access

Enumeration & Exploitation

SPN Discovery in Target Domain

# Enumerate accounts with SPNs in trusted domain
Get-DomainUser -SPN -Domain FREIGHTLOGISTICS.LOCAL | select SamAccountName

# Example output:
samaccountname
--------------
krbtgt
mssqlsvc

Target Assessment

Cross-Forest Kerberoasting Execution


πŸ‘₯ Admin Password Re-Use & Group Membership

Password Reuse Scenarios

  • Same company management: Both forests managed by same administrators

  • Account naming patterns: Similar admin account names across forests

  • Password policy weakness: Shared password practices across domains

  • Migration artifacts: Retained credentials during domain transitions

Foreign Group Membership Enumeration

Identify Cross-Forest Admin Access

SID to Name Conversion

Cross-Forest Authentication Validation


πŸ†” SID History Abuse - Cross Forest

Attack Concept

  • Migration scenario: User moved between forests without proper SID filtering

  • SID retention: Original domain SIDs preserved in SID History attribute

  • Privilege preservation: Administrative rights maintained across forest boundaries

  • Trust exploitation: SID filtering bypass for unauthorized privilege escalation

Attack Prerequisites

  • User migration: Account moved from Forest A to Forest B

  • SID filtering disabled: Trust configuration allows external SIDs

  • Administrative privileges: Original account had elevated rights in source forest

  • Trust authentication: Ability to authenticate across forest boundary

Attack Flow


🎯 HTB Academy Lab Solution

Lab Environment Setup

🎫 Question: "Perform a cross-forest Kerberoast attack and obtain the TGS for the mssqlsvc user. Crack the ticket and submit the account's cleartext password as your answer."

Complete Attack Solution:

Step 1: Initial Enumeration

Step 2: Target Assessment

Step 3: Cross-Forest Kerberoasting

Step 4: Hash Cracking

🎯 Answer: [Cleartext password obtained from hash cracking]


⚠️ Security Implications

Trust Configuration Weaknesses

  • Bidirectional trusts: Increase attack surface across forest boundaries

  • SID filtering disabled: Allows unauthorized privilege escalation

  • Foreign group membership: Cross-forest administrative access

  • Password reuse: Shared credentials across forest boundaries

Detection Considerations

  • Cross-forest authentication: Monitor unusual authentication patterns

  • Kerberos ticket requests: Detect TGS requests across trust boundaries

  • Foreign security principals: Audit cross-forest group memberships

  • SID History monitoring: Track SID History attribute modifications

Mitigation Strategies

  • Selective authentication: Restrict trust authentication scope

  • SID filtering: Enable proper SID filtering for external trusts

  • Privilege isolation: Separate administrative accounts per forest

  • Regular auditing: Review foreign group memberships and trust configurations


πŸ”‘ Key Takeaways

Cross-Forest Attack Vectors

Critical Success Factors

  • Trust understanding: Bidirectional forest trust authentication flows

  • Tool adaptation: PowerView and Rubeus cross-domain capabilities

  • Privilege mapping: Foreign group membership and administrative overlap

  • Attack validation: Cross-forest authentication and access confirmation

Professional Impact

  • Scope expansion: Single domain compromise β†’ multiple forest control

  • Attack sophistication: Advanced trust relationship exploitation

  • Assessment completeness: Comprehensive multi-forest security evaluation

  • Client value: Identification of inter-organizational security risks

🌲 Cross-Forest Trust Abuse represents advanced AD attack methodology - transforming single domain access into comprehensive multi-forest compromise through sophisticated trust relationship exploitation!


Last updated