技能 活动目录林信任攻击

活动目录林信任攻击

v20260317
performing-active-directory-forest-trust-attack
使用 impacket 枚举活动目录林信任关系、分析 SID 过滤、检测跨林 SID 历史滥用、查找外部安全主体并评估 Kerberos 信任票据,帮助渗透测试团队发现横向移动风险并制定修复建议。
获取技能
153 次下载
概览

Performing Active Directory Forest Trust Attack

Overview

Active Directory forest trusts enable authentication across organizational boundaries but introduce attack surface if misconfigured. This skill uses impacket to enumerate trust relationships, analyze SID filtering configuration, detect SID history abuse vectors, perform cross-forest SID lookups via LSA/LSAT RPC calls, and assess inter-realm Kerberos ticket configurations for trust ticket forgery risks.

Prerequisites

  • Python 3.9+ with impacket, ldap3
  • Domain credentials with read access to AD trust objects
  • Network access to Domain Controllers (ports 389, 445, 88)
  • Authorized penetration testing engagement or lab environment

Steps

  1. Enumerate forest trust relationships via LDAP trusted domain objects
  2. Query trust attributes and SID filtering status for each trust
  3. Perform SID lookups across trust boundaries using LsarLookupNames3
  4. Enumerate foreign security principals in trusted domains
  5. Check for SID history on cross-forest accounts
  6. Assess trust direction and transitivity for lateral movement paths
  7. Generate trust security audit report with risk findings

Expected Output

  • JSON report listing all trust relationships, SID filtering status, foreign principals, trust direction/transitivity, and risk assessment
  • Cross-forest attack path analysis with remediation recommendations
信息
Category 未分类
Name performing-active-directory-forest-trust-attack
版本 v20260317
大小 9.66KB
更新时间 2026-03-18
语言