Trust key
Attacking
How it works
Once you gain Domain Admin privileges within the child domain its possible to get Enterprise Admin in the parent domain by generating a golden ticket in the child domain with the SID of the Enterprise Admin group.
Tools
Executing the attack
The attack is executed from the perspective of already gaining domain admin privileges. This is done in the unconstrained delegation section:
Unconstrained DelegationFor easy execution, login on
WS01
as theAdministrator
user with the passwordWelcome01!
.Start PowerShell as Administrator and load a amsi bypass and MimiKatz into memory.

3. DCsync the trust key with MimiKatz:

4. Retrieve the SID of the enterprise Admins group, using PowerView:

5. Retrieve the domain SID from the child domain, using PowerView:

6. Create a TGT for the krbtgt user and save it to disk with MimiKatz:

7. Create a TGS for the CIFS service with Rubeus.exe using the created TGT:

List the tickets:

Defending
Detection
References
Last updated