Active Directory Trust relationships allow users in one domain to access resources in another. They're essential for large organizations - but they're also pathways for attackers. Compromise one domain, and trusts can lead you to others.
Think of trusts like border agreements between countries. A trust says "citizens from Domain A can visit Domain B." But if you forge citizenship documents (like Golden Tickets with extra SIDs), you can claim to be anyone.Related
Trust = Access Expansion
Every trust relationship is a potential lateral movement path. In pentests, enumerating and exploiting trusts often leads from a child domain all the way to the forest root.
Types of Trusts
Enumerating Trusts
Child to Parent Domain Escalation
Attack Steps
Forest Root = Game Over
Enterprise Admins have admin rights across the ENTIRE forest. From one child domain compromise, you can escalate to control every domain in the forest.
SID Filtering & SID History
Checking SID Filtering Status
Cross-Forest Attacks
Trust Key Attacks
Exploiting Foreign Principals
Detection & Defense
Selective Authentication
Instead of trusting all users from a domain, Selective Authentication requires explicit permission for each resource. More restrictive but more secure.
Trust Attack Methodology
Trust Exploitation Flow
1
Map TrustsEnumerate all trust relationships
2
Check FilteringDetermine if SID filtering is enabled
3
Find PathsLook for cross-trust group memberships
4
Get KeysDCSync trust keys if possible
5
Forge TicketsCreate tickets with extra SIDs
6
EscalateUse access to compromise more domains
Knowledge Check
Challenges
Key Takeaways
- Parent-child trusts lack SID filtering = easy escalation
- Enterprise Admins SID (519) grants forest-wide access
- SID filtering blocks extra-SID attacks on forest trusts
- Foreign group memberships create cross-trust paths
- Trust keys enable inter-realm ticket forging
- Always enumerate trusts - they expand your attack surface