π²Cross-Forest Trust Abuse - from Windows
π― HTB Academy: Active Directory Enumeration & Attacks
π Overview
Cross-Forest Trust Abuse exploits bidirectional forest trust relationships to expand attack scope beyond the initial compromise domain. These techniques leverage trust authentication flows to perform attacks like Kerberoasting, identify administrative privilege overlap, and abuse foreign group memberships for lateral movement across forest boundaries.
π« Cross-Forest Kerberoasting
Attack Methodology
Trust requirement: Bidirectional or inbound forest trust
Target identification: SPNs in trusted domains
Execution scope: Kerberos ticket requests across trust boundaries
Goal: Crack service account hashes for privileged access
Enumeration & Exploitation
SPN Discovery in Target Domain
# Enumerate accounts with SPNs in trusted domain
Get-DomainUser -SPN -Domain FREIGHTLOGISTICS.LOCAL | select SamAccountName
# Example output:
samaccountname
--------------
krbtgt
mssqlsvcTarget Assessment
Cross-Forest Kerberoasting Execution
π₯ Admin Password Re-Use & Group Membership
Password Reuse Scenarios
Same company management: Both forests managed by same administrators
Account naming patterns: Similar admin account names across forests
Password policy weakness: Shared password practices across domains
Migration artifacts: Retained credentials during domain transitions
Foreign Group Membership Enumeration
Identify Cross-Forest Admin Access
SID to Name Conversion
Cross-Forest Authentication Validation
π SID History Abuse - Cross Forest
Attack Concept
Migration scenario: User moved between forests without proper SID filtering
SID retention: Original domain SIDs preserved in SID History attribute
Privilege preservation: Administrative rights maintained across forest boundaries
Trust exploitation: SID filtering bypass for unauthorized privilege escalation
Attack Prerequisites
User migration: Account moved from Forest A to Forest B
SID filtering disabled: Trust configuration allows external SIDs
Administrative privileges: Original account had elevated rights in source forest
Trust authentication: Ability to authenticate across forest boundary
Attack Flow
π― HTB Academy Lab Solution
Lab Environment Setup
π« Question: "Perform a cross-forest Kerberoast attack and obtain the TGS for the mssqlsvc user. Crack the ticket and submit the account's cleartext password as your answer."
Complete Attack Solution:
Step 1: Initial Enumeration
Step 2: Target Assessment
Step 3: Cross-Forest Kerberoasting
Step 4: Hash Cracking
π― Answer: [Cleartext password obtained from hash cracking]
β οΈ Security Implications
Trust Configuration Weaknesses
Bidirectional trusts: Increase attack surface across forest boundaries
SID filtering disabled: Allows unauthorized privilege escalation
Foreign group membership: Cross-forest administrative access
Password reuse: Shared credentials across forest boundaries
Detection Considerations
Cross-forest authentication: Monitor unusual authentication patterns
Kerberos ticket requests: Detect TGS requests across trust boundaries
Foreign security principals: Audit cross-forest group memberships
SID History monitoring: Track SID History attribute modifications
Mitigation Strategies
Selective authentication: Restrict trust authentication scope
SID filtering: Enable proper SID filtering for external trusts
Privilege isolation: Separate administrative accounts per forest
Regular auditing: Review foreign group memberships and trust configurations
π Key Takeaways
Cross-Forest Attack Vectors
Critical Success Factors
Trust understanding: Bidirectional forest trust authentication flows
Tool adaptation: PowerView and Rubeus cross-domain capabilities
Privilege mapping: Foreign group membership and administrative overlap
Attack validation: Cross-forest authentication and access confirmation
Professional Impact
Scope expansion: Single domain compromise β multiple forest control
Attack sophistication: Advanced trust relationship exploitation
Assessment completeness: Comprehensive multi-forest security evaluation
Client value: Identification of inter-organizational security risks
π² Cross-Forest Trust Abuse represents advanced AD attack methodology - transforming single domain access into comprehensive multi-forest compromise through sophisticated trust relationship exploitation!
Last updated