π²Cross-Forest Trust Abuse - from Windows
π― HTB Academy: Active Directory Enumeration & Attacks
π Overview
π« Cross-Forest Kerberoasting
Attack Methodology
Enumeration & Exploitation
SPN Discovery in Target Domain
# Enumerate accounts with SPNs in trusted domain
Get-DomainUser -SPN -Domain FREIGHTLOGISTICS.LOCAL | select SamAccountName
# Example output:
samaccountname
--------------
krbtgt
mssqlsvcTarget Assessment
Cross-Forest Kerberoasting Execution
π₯ Admin Password Re-Use & Group Membership
Password Reuse Scenarios
Foreign Group Membership Enumeration
Identify Cross-Forest Admin Access
SID to Name Conversion
Cross-Forest Authentication Validation
π SID History Abuse - Cross Forest
Attack Concept
Attack Prerequisites
Attack Flow
π― HTB Academy Lab Solution
Lab Environment Setup
π« Question: "Perform a cross-forest Kerberoast attack and obtain the TGS for the mssqlsvc user. Crack the ticket and submit the account's cleartext password as your answer."
β οΈ Security Implications
Trust Configuration Weaknesses
Detection Considerations
Mitigation Strategies
π Key Takeaways
Cross-Forest Attack Vectors
Critical Success Factors
Professional Impact
Last updated