Abuse Info
An attacker with control over any domain within the forest can escalate their privileges to compromise other domains through multiple methods.Spoof SID history
An attacker can spoof the SID history of a principal in the target domain, tricking the target domain into treating the attacker as a privileged user. See the SpoofSIDHistory edge for more information. This attack fails if SID filtering (quarantine) is enabled on the trust relationship in the opposite direction of the attack. The SID filtering blocks SIDs belonging to any other domain than the attacker-controlled domain. However, enabling this setting is rare and generally not recommended.Coerce to TGT
An attacker can coerce a privileged computer (e.g., a DC) in the target domain to authenticate to an attacker-controlled computer configured with unconstrained delegation. This provides the attacker with a Kerberos TGT for the coerced computer. See the CoerceToTGT edge for more information. The attack fails if SID filtering (quarantine) is enabled, as this prevents TGTs from being sent across the trust boundary. Again, this setting is rarely configured.ADCS ESC5
The Configuration Naming Context (NC) is a forest-wide partition writable by any DC within the forest. Most Active Directory Certificate Services (ADCS) configurations are stored in the Configuration NC. An attacker can abuse a DC to modify ADCS configurations to enable an ADCS domain escalation opportunity that compromises the entire forest. Attack Steps:- Obtain a SYSTEM session on a DC in the attacker-controlled domain
- Create a certificate template allowing ESC1 abuse
- Publish the certificate template to an enterprise CA
- Enroll the certificate as a privileged user in the target domain
- Authenticate as the privileged user in the target domain using the certificate
GPO linked on Site
AD sites are stored in the forest-wide Configuration NC partition, writable by any DC within the forest. An attacker with SYSTEM access to a DC can link a malicious GPO to the site of any DC in the forest. Step 1: Obtain a SYSTEM session on a DC in the attacker-controlled domain Use PsExec to start a PowerShell terminal as SYSTEM on the DC:Opsec Considerations
There is no OPSEC associated with this edge.References
This edge is related to the following MITRE ATT&CK tactic and techniques:- T1134.005: Access Token Manipulation: SID-History Injection
- T1187: Forced Authentication
- T1649: Steal or Forge Authentication Certificates
- T1558: Steal or Forge Kerberos Tickets
- T1550.003: Use Alternate Authentication Material: Pass the Ticket
- T1484.001: Domain or Tenant Policy Modification: Group Policy Modification