[New Module: trust-enum.py] Add trust-enum module for domain trust enumeration with SID, hash extraction, and inter-realm ticket forging #1001
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
This pull request introduces the complete
trust-enummodule for domain trust enumeration and sensitive hash extraction in Active Directory environments. The module adds the following key features:This change does not introduce breaking modifications to existing functionality; instead, it adds substantial new enumeration and attack support for LDAP protocol targeting domain controllers.
No new third-party dependencies are added beyond Impacket, which the project already relies on. The module includes extensive in-line documentation and error handling. For forging tickets, the Kerberos cryptographic and ASN.1 methods are based on Impacket's existing classes.
Type of change
Insert an "x" inside the brackets for relevant items (do not delete options)
Setup guide for the review
impacketis installed and all NetExec dependencies are satisfied (poetry install).netexec ldap <dc-ip> -u <username> -p <password> -M trust-enumto enumerate all trusts.-o NO_HASHES=Trueto skip hash extraction..ccachefiles are generated and can be used withexport KRB5CCNAME=...and relevant Kerberos tooling.Screenshots (if appropriate):
Checklist:
Insert an "x" inside the brackets for completed and relevant items (do not delete options)
poetry run python -m ruff check . --preview, use--fixto automatically fix what it can)tests/e2e_commands.txtfile if necessary (new modules or features are required to be added to the e2e tests)