The Hacker Recipes
The Hacker Recipes
GitHub
Twitter
Introduction
Active Directory (AD-DS)
Recon
Movement
Credentials
Coerced authentications
LM and NTLM
Kerberos
Access Control Entries (ACEs)
Group Policy Objects (GPOs)
Domain settings
๐Ÿ› ๏ธ Domain trusts
๐Ÿ› ๏ธ Privileged groups
๐Ÿ› ๏ธ Netlogon
๐Ÿ› ๏ธ Frontal attacks
๐Ÿ› ๏ธ Persistence
Web services
Recon
๐Ÿ› ๏ธ Configuration
Accounts and sessions
Inputs
๐Ÿ› ๏ธ Servers
Port scanning
Abusing services
Privilege escalation
Pivoting
๐Ÿ› ๏ธ Intelligence gathering
CYBINT
OSINT
GEOINT
๐Ÿ› ๏ธ Physical
Keylogging
HID injection
Attacks on drives
Lockpicking
๐Ÿ› ๏ธ RADIO
RFID
Bluetooth
Wi-Fi
Wireless keyboard/mouse
Powered by GitBook

๐Ÿ› ๏ธ Domain trusts

โ€‹

This is a work-in-progress. It's indicated with the ๐Ÿ› ๏ธ emoji in the page name or in the category name

Access direction = !(one-way trust direction)

Trust Technologies: Domain and Forest Trusts
docs.microsoft.com
A Guide to Attacking Domain Trusts
Itโ€™s been a while (nearly 2 years) since I wrote a post purely on Active Directory domain trusts. After diving into group scoping, I realized a few subtle misconceptions I previously had concโ€ฆ
www.harmj0y.net

โ€‹

Previous
MachineAccountQuota
Next
๐Ÿ› ๏ธ Privileged groups
Last updated 4 months ago
Edit on GitHub