Cross Forest Attacks
Trust flow
Dump trust keys
Look for in trust key from child to parent (first command) Look for NTLM hash (second command)
Create a intern-forest TGT
Create a TGS for a service (kekeo_old)
Use the TGT
Check access to server
Trust abuse SQL
Discovery SPN scanning
Check accessibility
Gather information
Search for links to remote servers
Enumerate database links
Enable xp_cmdshell
Execute commands
Execute reverse shell example
Last updated