Using Trust Tickets
Child to Parent using Trust Tickets
We will extract the trust key, and then forge an inter-realm TGT where we inject a SID History of Enterprise Admin.
To extract trust tickets, look for [In] trust key from child to parent.
OR run DCSync to extract
OR extract all the secrets from DC
Now, we can forge the inter-realm TGT using the trust key obtained. Note: Unless, explicitly specified, across trusts (within or across forests), AES is not supported. RC4 is supported.
Kerberos::golden
The mimikatz module
/domain
FQDN of the current domain
/sid
SID of the current domain
/sids
SID of the enterprise admins group of the parent domain
/rc4
RC4 of the trust key
/user
User to impersonate
/service
Target service in the parent domain
/target
FQDN of the parent domain
/ticket
Path where the ticket is to be saved (e.g., C:\AD\Tools\trust_tkt.kirbi)
Now we can request a TGS from parent DC to access a service (CIFS) on DC on the parent root DC.
We can now access forest root DC.
Last updated