Module 18 Flashcards

(51 cards)

1
Q

What is the primary purpose of a trust relationship in Active Directory?

A

To allow one forest or domain to share its resources with another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A two-way, transitive trust that is automatically created when a new domain is added to an existing tree is known as a _____ trust.

A

Parent/Child

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of trust is a two-way, transitive trust automatically created when a new domain tree is added to an existing forest?

A

Tree-Root Trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an External Trust in Active Directory?

A

A one or two-way, non-transitive trust that enables resource sharing between domains in different forests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____ trust is a one or two-way transitive trust that enables resources to be shared between different forests.

A

Forest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the context of AD trusts, what does ‘transitivity’ determine?

A

Whether the trust relationship extends beyond the two domains or forests with which it was explicitly formed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If Domain A transitively trusts Domain B, and Domain B transitively trusts Domain C, what is the resulting trust relationship between Domain A and Domain C?

A

Domain A implicitly trusts Domain C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the key difference in access permissions between a one-way and a two-way trust?

A

A one-way trust allows access in one direction, while a two-way trust allows access in both directions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confusingly, the direction of a trust is _____ to the direction of access.

A

opposite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a one-way trust from Domain A to Domain B allowing A’s users to access B’s resources, which domain is the ‘trusting’ domain and which is the ‘trusted’?

A

Domain A is the ‘trusting’ domain, and Domain B is the ‘trusted’ domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are two-way trusts actually implemented in Active Directory?

A

They are implemented as two separate one-way trusts in opposite directions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Trusted Domain Object (TDO) in Active Directory?

A

An object in Active Directory that stores information about a trust relationship, including its type, transitivity, and shared password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How often does the primary domain controller in the trusting domain change the TDO password?

A

Every 30 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What LDAP object class can be queried to read information about trust relationships?

A

The trustedDomain object class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a TDO, what does the trustDirection attribute value of ‘1’ signify?

A

TRUST_DIRECTION_INBOUND.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In a TDO, what does the trustDirection attribute value of ‘2’ signify?

A

TRUST_DIRECTION_OUTBOUND.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does a trustDirection value of ‘3’ on a TDO indicate?

A

The trust is bidirectional (TRUST_DIRECTION_BIDIRECTIONAL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The trustAttributes flag of ‘1’ on a TDO indicates what property?

A

The trust is non-transitive (TRUST_ATTRIBUTE_NON_TRANSITIVE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does the trustAttributes flag of ‘8’ on a TDO signify?

A

The trust is transitive between two forests (TRUST_ATTRIBUTE_FOREST_TRANSITIVE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A trustAttributes flag of ‘32’ on a TDO indicates that the trust is _____.

A

between two domains in the same forest (TRUST_ATTRIBUTE_WITHIN_FOREST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the official security boundary in an Active Directory environment?

A

The forest level.

22
Q

Why can’t TGTs issued in one realm be decrypted by another realm’s KDC in a trust scenario?

A

Because the trusting realm does not have access to the trusted realm’s krbtgt secret key.

23
Q

What cryptographic component bridges the gap for Kerberos authentication between two different realms?

A

An inter-realm key.

24
Q

What type of Kerberos ticket does a KDC return when a client requests a service in a different, trusted realm?

A

An inter-realm TGT, also known as a referral ticket.

25
An inter-realm TGT is issued by the trusted realm's KDC but is encrypted using the _____ instead of the krbtgt secret.
shared inter-realm key
26
When a client receives an inter-realm TGT, what is the SPN set to in the ticket?
The `krbtgt` service of the trusting realm.
27
After receiving an inter-realm TGT, where does the client send its next TGS-REQ?
Directly to the KDC of the trusting realm.
28
What kind of account is created to represent the ticket-granting service of a trusting realm within a trusted realm's KDC?
A trust account, typically named after the flat name of the opposing realm (e.g., PARTNER$).
29
What `samAccountType` value corresponds to a trust account in Active Directory?
`SAM_TRUST_ACCOUNT` (805306370).
30
In a trust relationship, where is the shared inter-realm key stored from the perspective of the trusted domain?
It is used as the password for the trust account (e.g., `PARTNER$`).
31
In a trust relationship, where is the shared inter-realm key stored from the perspective of the trusting domain?
Inside the Trusted Domain Object (TDO).
32
What privilege escalation path exists if an adversary gains domain admin in a child domain?
They can elevate their privileges to that of an enterprise admin in the forest root.
33
What ticket attribute, designed for migration scenarios, can be abused to escalate privileges from a child to a parent domain?
SID History.
34
In a parent/child trust abuse scenario, what SID is typically added to a forged golden ticket's SID History?
The SID of a privileged group in the parent domain, such as the Enterprise Admins group.
35
When forging a golden ticket to attack a parent domain, which domain's `krbtgt` hash is required?
The AES hash of the child domain's `krbtgt` account.
36
What does the `/sids` parameter specify in the Rubeus golden ticket command for a parent/child trust attack?
A list of SIDs to be included in the ticket's SID history, specifically the SID of a privileged parent domain group.
37
What mechanism in external and forest trusts prevents SID History abuse by ignoring SIDs not native to the trusting domain?
SID filtering.
38
What special AD container holds `foreignSecurityPrincipal` objects representing principals from external trusted domains?
The Foreign Security Principals Container.
39
When attacking a one-way inbound trust from the trusted side, what is the primary adversarial strategy?
To find and impersonate principals from the trusted domain that have legitimate access to resources in the trusting domain.
40
When enumerating a trusting domain from a trusted domain, how can you identify which foreign security principals have been granted permissions?
By querying the `foreignSecurityPrincipal` object class in the trusting domain and checking the `memberOf` attribute.
41
When attacking a one-way inbound trust from the trusted domain, how can an adversary obtain the inter-realm key?
By dumping the credentials for the associated trust account (e.g., `CONTOSO\PARTNER$`) via DCSync.
42
What Rubeus command is used to forge an inter-realm TGT (referral ticket) using a known inter-realm key?
The `silver` command.
43
When using `rubeus silver` to forge an inter-realm TGT, what should the `/service` parameter be set to?
The `krbtgt` service of the trusting domain (e.g., `krbtgt/partner.com`).
44
After forging an inter-realm TGT, what Rubeus command is used to request a service ticket from the trusting domain?
The `asktgs` command.
45
What does the `/ticket` parameter specify in the `rubeus asktgs` command?
The forged inter-realm TGT that will be used to request the service ticket.
46
When on the trusting side of a one-way outbound trust, why does attempting to enumerate the trusted domain typically fail?
Because you are against the direction of access, and the local KDC has no referral information for the foreign domain.
47
What Kerberos error is typically returned when a user on the trusting side of a one-way trust requests a ticket for the trusted domain?
`KDC_ERR_S_PRINCIPAL_UNKNOWN`.
48
From the trusting side of a one-way trust, how can an adversary obtain the inter-realm key?
By dumping the key from the local Trusted Domain Object (TDO) using its `objectGUID` with `mimikatz lsadump::dcsync`.
49
What Rubeus command allows an adversary on the trusting side to get a TGT from the trusted domain using the inter-realm key?
The `asktgt` command.
50
When using `rubeus asktgt` to attack a trusted domain from the trusting side, what user should be specified with `/user`?
The trust account name (e.g., `PARTNER$`).
51
After obtaining a TGT for the trust account, why is it possible to enumerate the trusted domain?
Because the trust account's `primaryGroupID` is 513 (Domain Users), granting it default enumeration privileges.