Cross Forest
Last updated
Last updated
If a user wants to access a service in eurocorp forest.
In step 4, we receive the inter-realm TGT which is encrypted using a Trust Key. Once the mcorp-dc decrypts the inter-realm TGT using the trust key, the user can request a TGS and then access the application server using the TGS.
Genrally, it is not possible to escalate privileges across forests as the forest is a security boundary. It uses SID Filtering (500 > 1000). The TGT would be accepted but the SID would be filtered by the parent DC.
This means an Administrator of dcorp cannot access the DC of eurocorp and escalate to Enterprise Admin of eurocorp.
If there is a service on eurocorp that can be accessible by dcorp admins, we could use the trust key to access that resource.
Once again, we require the trust key for the inter-forest trust. i.e, Trust between dcorp and eurocorp.
Or
An inter-forest TGT can be forged
Using the same TGT which we forged earlier, we request a TGS for CIFS on ecorp:
Now we can run commands on remote systems
How to enumerate which file shares accessible to us?
But enumerating this is not practical in real world because for 100 machines, we can't request 100 CIFS tickets and then run net view.