⚔️
Pentest CodeX
search
⌘Ctrlk
LinkedInGithub
⚔️
Pentest CodeX
  • Home
    • WHOAMI
  • Network Pentest
    • Recon
    • Enumeration
    • Exploitation
    • Pre Exploitation
    • Post-Exploitation
    • Privilege Escalation
    • Active Directory Attack
  • Courses
    • HTB-CPTS
      • Enumeration
      • Nmap
      • Active Directory Enumeration & Attacks
        • 0. AD Pentest
        • 1.Initial Enumeration
        • 2.Sniffing out a Foothold
        • 3.Sighting In, Hunting For A User
        • 4.Spray Responsibly
        • 5.Deeper Down the Rabbit Hole
        • 6.Cooking with Fire
        • 7.An ACE in the Hole
        • 8.Stacking The Deck
        • 9.Why So Trusting
        • 10.Breaking Down Boundaries
          • 27.Attacking Domain Trusts - Cross-Forest Trust Abuse - from Windows
          • 28.Attacking Domain Trusts - Cross-Forest Trust Abuse - from Linux
        • 11.Defensive Considerations
      • Attacking Common Services
      • Attacking Common Applications
      • File Inclusion
      • Web Attacks
      • XSS
      • Web Service & API Attacks
      • Server-side Attacks
      • Linux Privilege Escalation
      • Windows Privilege Escalation
      • Command Injections
      • SQL Injection
      • Broken Authentication
      • Login Brute Forcing
      • Password Attacks
      • Password-Cracking
      • Session Security Guide
      • File Transfer
      • File Upload Attacks
      • Shells and Payloads
      • Upgrading TTY Shell
      • Using The Metasploit Framework
      • Ligolo-ng
      • Pivoting Tunneling and Port Forwarding
      • CPTS Tips
    • OSCP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Courseschevron-right
  2. HTB-CPTSchevron-right
  3. Active Directory Enumeration & Attacks

10.Breaking Down Boundaries

27.Attacking Domain Trusts - Cross-Forest Trust Abuse - from Windowschevron-right28.Attacking Domain Trusts - Cross-Forest Trust Abuse - from Linuxchevron-right
Previous26. Attacking Domain Trusts - Child - Parent Trusts - from Linuxchevron-leftNext27.Attacking Domain Trusts - Cross-Forest Trust Abuse - from Windowschevron-right

Last updated 10 months ago