{"id":1557,"date":"2025-04-03T08:20:25","date_gmt":"2025-04-03T08:20:25","guid":{"rendered":"https:\/\/hackmybox.com\/?p=1557"},"modified":"2025-09-08T14:03:14","modified_gmt":"2025-09-08T14:03:14","slug":"visual-composer-1557","status":"publish","type":"post","link":"https:\/\/hackmybox.com\/index.php\/2025\/04\/03\/visual-composer-1557\/","title":{"rendered":"Attacking Domain Trusts"},"content":{"rendered":"<div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-3155d39d\" data-vce-do-apply=\"all el-3155d39d\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-f6bb2a66\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-f6bb2a66\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-f6bb2a66\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-af988df4\" data-vce-do-apply=\"all el-af988df4\"><p style=\"text-align: center;\"><span style=\"color: #00ff00;\">(Insights From HTB Academy)<\/span><\/p><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-337bbff5\" data-vce-do-apply=\"all el-337bbff5\"><p>Think of a \"domain\" like a company's computer network. \"Domain trusts\" are like agreements that let users from one network access resources (files, printers, etc.) on another network. This is useful when companies merge or work with partners.<\/p><p><span style=\"color: #ffff00;\">Key Points:<\/span><\/p><ul><li><span style=\"color: #ffff00;\">Why Trusts?<\/span> <br>They make it easier for people to access resources across different networks without having to create new accounts for everyone.<\/li><li><span style=\"color: #ffff00;\">Trust Risks:<\/span> <br>If one network has weak security, it can be a backdoor to another network. Hackers can exploit this to gain access to sensitive information.<\/li><li><span style=\"color: #ffff00;\">Trust Types:<\/span> <br>There are different kinds of trusts, like between a main company network and a branch office network, or between two separate companies.<\/li><li><span style=\"color: #00ff00;\">Transitive vs. Non-Transitive:<\/span><br>Transitive - If network A trusts network B, and network B trusts network C, then network A also trusts network C.<br>Non-Transitive - Trust only goes directly between the two networks set up in the trust; it doesn't extend to other networks.<\/li><li><span style=\"color: #00ff00;\">One-Way vs. Two-Way:<\/span><br>One-Way - Users in network A can access resources in network B, but not the other way around.<br>Two-Way - Users in both networks can access resources in each other's networks.<\/li><li><span style=\"color: #ffff00;\">Security Concerns:<\/span> <br>Trusts can be set up quickly for convenience, but the security implications aren't always considered. This can create security holes.<\/li><li><span style=\"color: #ffff00;\">Finding Trusts:<\/span> <br>Tools like \"<span style=\"color: #00ff00;\">Get-ADTrust<\/span>\" (PowerShell), \"<span style=\"color: #00ff00;\">PowerView<\/span>,\" \"<span style=\"color: #00ff00;\">BloodHound<\/span>,\" and \"<span style=\"color: #00ff00;\">netdom<\/span>\" can be used to list the trust relationships between networks.<\/li><\/ul><p><span style=\"color: #ffff00;\">Attacking Trusts:<\/span> <br>Hackers can use techniques like \"SID History Injection\" to gain administrator-level access in a trusted network, even if they only compromise a less secure network.<\/p><p>This section explains how a hacker who has gained control of a \"child\" network can use that access to take over the \"parent\" network in a domain trust relationship. It focuses on a specific technique called \"ExtraSids\" using tools like Mimikatz and Rubeus.<\/p><p><span style=\"color: #ffff00;\">Key Concepts:<\/span><\/p><ul><li><span style=\"color: #00ff00;\">SID History:<\/span><br>Imagine a user moving from one office to another in a company. To make sure they still have access to the same files, the company might give their new account a \"list\" of their old account's IDs. This \"list\" is called \"SID History.\"<br>Normally, this is for legitimate migrations, but hackers can abuse it.<\/li><li><span style=\"color: #00ff00;\">ExtraSids Attack:<\/span><br>This is a way to trick the parent network into thinking a hacker-controlled account in the child network is an administrator in the parent network.<br>It works because the child and parent networks might not have strong enough security (\"SID Filtering\") to prevent this trick.<\/li><li><span style=\"color: #00ff00;\">Golden Ticket:<\/span><br>Think of this as a \"master key\" that lets a hacker access almost anything in a network. Hackers can create these using information they gather.<\/li><li><span style=\"color: #00ff00;\">Mimikatz and Rubeus:<\/span><br>These are hacking tools that can be used to steal passwords and create \"Golden Tickets.\"<\/li><\/ul><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-5922e151\" data-vce-do-apply=\"all el-5922e151\"><p><span style=\"color: #ffff00;\">Steps of the Attack :<\/span><\/p><p><span style=\"color: #ffff00;\">1.&nbsp;<\/span> Compromise the Child Domain:<br>The hacker first gains control of the child network.<\/p><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-fbf97f92\" data-vce-do-apply=\"all el-fbf97f92\"><p><span style=\"color: #ffff00;\">2.<\/span> Gather Information: The hacker uses tools to find specific \"IDs\" (SIDs) and a special password (\"KRBTGT hash\") within the child network and the parent network.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-2b8ccf51\" data-vce-do-apply=\"all el-2b8ccf51\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 918px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 21.4597%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"918\" height=\"197\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/get-domain-e1743667408635-320x69.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/get-domain-e1743667408635-480x103.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/get-domain-e1743667408635-800x172.png 800w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/get-domain-e1743667408635-918x197.png 918w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/get-domain-e1743667408635-918x197.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/get-domain-e1743667408635.png\" data-attachment-id=\"1571\"  alt=\"\" title=\"get-domain\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-b5922bb5\" data-vce-do-apply=\"all el-b5922bb5\"><p><span style=\"color: #ffff00;\">3.&nbsp;<\/span> Create a \"Golden Ticket\": <br>The hacker uses Mimikatz or Rubeus to create a \"Golden Ticket\" that gives them administrator access to the parent network. They essentially forge credentials.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-9d1f7dd1\" data-vce-do-apply=\"all el-9d1f7dd1\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 772px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 58.9378%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"772\" height=\"455\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/mimikatz-e1743667509945-320x189.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/mimikatz-e1743667509945-480x283.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/mimikatz-e1743667509945-772x455.png 772w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/mimikatz-e1743667509945-772x455.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/mimikatz-e1743667509945.png\" data-attachment-id=\"1569\"  alt=\"\" title=\"mimikatz\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-raw-html\"><div class=\"vce-raw-html-wrapper\" id=\"el-52077faf\" data-vce-do-apply=\"all el-52077faf\"><script async=\"\" src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1499161372675368\" crossorigin=\"anonymous\"><\/script>\n<ins class=\"adsbygoogle\" style=\"display:block\" data-ad-format=\"fluid\" data-ad-layout-key=\"-c2+73+2h-1m-4u\" data-ad-client=\"ca-pub-1499161372675368\" data-ad-slot=\"8728040126\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-7a04e229\" data-vce-do-apply=\"all el-7a04e229\"><p><span style=\"color: #ffff00;\">4.&nbsp;<\/span> Access the Parent Domain: <br>The hacker uses the \"Golden Ticket\" to access files, systems, and accounts in the parent network, effectively taking it over.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-2332d10a\" data-vce-do-apply=\"all el-2332d10a\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 909px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 66.8867%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"909\" height=\"608\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/klist3-1-320x214.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/klist3-1-480x321.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/klist3-1-800x535.png 800w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/klist3-1-909x608.png 909w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/klist3-1-909x608.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/04\/klist3-1.png\" data-attachment-id=\"1576\"  alt=\"\" title=\"klist3\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-7fd0944d\" data-vce-do-apply=\"all el-7fd0944d\"><p><span style=\"color: #ffff00;\">Conclusion:<\/span><\/p><p>This attack shows how weaknesses in domain trust configurations can have serious consequences. Even if a company thinks its main network is secure, a less secure branch or subsidiary network can be a point of entry for attackers.<\/p><\/div><\/div><div class=\"vce vce-separator-container vce-separator--align-center vce-separator--style-solid\" id=\"el-12bdbf8b\" data-vce-do-apply=\"margin el-12bdbf8b\"><div class=\"vce-separator vce-separator--color-bfc0c1 vce-separator--width-60 vce-separator--thickness-1\" data-vce-do-apply=\"border padding background  el-12bdbf8b\"><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-1e956a38\" data-vce-do-apply=\"all el-1e956a38\"><p>Want to learn more and gain hands-on experience? Sign up with HTB Academy by clicking the link below.<\/p><\/div><\/div><div class=\"vce-button--style-basic-container vce-button--style-basic-container--align-center\"><span class=\"vce-button--style-basic-wrapper vce\" id=\"el-00ebc347\" data-vce-do-apply=\"margin el-00ebc347\"><a class=\"vce-button vce-button--style-basic vce-button--style-basic--border-rounded vce-button--style-basic--size-medium vce-button--style-basic--color-b-138-198-10--fff\" href=\"http:\/\/hacktheboxltd.sjv.io\/19DPP6\" title=\"\" data-vce-do-apply=\"padding border background  el-00ebc347\">JOIN NOW<\/a><\/span><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-f8a1dc28\" data-vce-do-apply=\"all el-f8a1dc28\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-0a624284\" data-vce-do-apply=\"all el-0a624284\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-507bfd81\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-507bfd81\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-507bfd81\"><div class=\"vcv-row-control-wrapper\"><\/div><\/div><\/div><\/div><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first\" id=\"el-888fc96a\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-888fc96a\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-888fc96a\"><div class=\"vcv-row-control-wrapper\"><\/div><\/div><\/div><\/div><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last\" id=\"el-7af63a57\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-7af63a57\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-7af63a57\"><div class=\"vcv-row-control-wrapper\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>(Insights From HTB Academy)Think of a &#8220;domain&#8221; like a company&#8217;s computer network. &#8220;Domain trusts&#8221; are like agreements that let users from one network access resources (files, printers, etc.) on another network. This is useful when companies merge or work with partners.Key Points:Why Trusts? They make it easier for people to access resources across different networks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2019,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","site-transparent-header":"default","prose-style":"enable","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[18],"tags":[],"class_list":["post-1557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-active-directory"],"_links":{"self":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/1557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/comments?post=1557"}],"version-history":[{"count":22,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/1557\/revisions"}],"predecessor-version":[{"id":2061,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/1557\/revisions\/2061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media\/2019"}],"wp:attachment":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media?parent=1557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/categories?post=1557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/tags?post=1557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}