Skip to content

T1482 Domain Trust Discovery

Adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities in Windows multi-domain/forest environments. Domain trusts provide a mechanism for a domain to allow access to resources based on the authentication procedures of another domain.3 Domain trusts allow the users of the trusted domain to access resources in the trusting domain. The information discovered may help the adversary conduct SID-History Injection, Pass the Ticket, and Kerberoasting.25 Domain trusts can be enumerated using the DSEnumerateDomainTrusts() Win32 API call, .NET methods, and LDAP.5 The Windows utility Nltest is known to be used by adversaries to enumerate domain trusts.1

Item Value
ID T1482
Sub-techniques
Tactics TA0007
Platforms Windows
Version 1.2
Created 14 February 2019
Last Modified 24 October 2025

Procedure Examples

ID Name Description
S0552 AdFind AdFind can gather information about organizational units (OUs) and domain trusts from Active Directory.71089
G1024 Akira Akira uses the built-in Nltest utility or tools such as AdFind to enumerate Active Directory trusts in victim environments.37
S1081 BADHATCH BADHATCH can use nltest.exe /domain_trusts to discover domain trust relationships on a compromised machine.32
S0534 Bazar Bazar can use Nltest tools to obtain information about the domain.2122
G1043 BlackByte BlackByte enumerated Active Directory information and trust relationships during operations.3635
S0521 BloodHound BloodHound has the ability to map domain trusts and identify misconfigurations for potential abuse.17
S1063 Brute Ratel C4 Brute Ratel C4 can use LDAP queries and nltest /domain_trusts for domain trust discovery.1516
C0015 C0015 During C0015, the threat actors used the command nltest /domain_trusts /all_trusts to enumerate domain trusts.49
G0114 Chimera Chimera has nltest /domain_trusts to identify domain trust relationships.38
S0105 dsquery dsquery can be used to gather information on domain trusts with dsquery * -filter “(objectClass=trustedDomain)” -attr *.5
S1159 DUSTTRAP DUSTTRAP can identify Active Directory information and related items.33
G1006 Earth Lusca Earth Lusca has used Nltest to obtain information about domain controllers.40
S0363 Empire Empire has modules for enumerating domain trusts.6
G0061 FIN8 FIN8 has retrieved a list of trusted domains by using nltest.exe /domain_trusts.44
S0483 IcedID IcedID used Nltest during initial discovery.2324
S1160 Latrodectus Latrodectus can run C:\Windows\System32\cmd.exe /c nltest /domain_trusts to discover domain trusts.3130
C0049 Leviathan Australian Intrusions Leviathan performed Active Directory enumeration of victim environments during Leviathan Australian Intrusions.45
G0030 Lotus Blossom Lotus Blossom has used tools such as AdFind to make Active Directory queries.39
G0059 Magic Hound Magic Hound has used a web shell to execute nltest /trusted_domains to identify trust relationships.43
S1146 MgBot MgBot includes modules for collecting information on local domain users and permissions.28
S0359 Nltest Nltest may be used to enumerate trusted domains by using commands such as nltest /domain_trusts.1314
S1145 Pikabot Pikabot will gather information concerning the Windows Domain the victim machine is a member of during execution.25
S0378 PoshC2 PoshC2 has modules for enumerating domain trusts.18
S0194 PowerSploit PowerSploit has modules such as Get-NetDomainTrust and Get-NetForestTrust to enumerate domain and forest trusts.1920
S0650 QakBot QakBot can run nltest /domain_trusts /all_trusts for domain trust discovery.29
S1071 Rubeus Rubeus can gather information about domain trusts.1211
S1124 SocGholish SocGholish can profile compromised systems to identify domain trust relationships.2627
C0024 SolarWinds Compromise During the SolarWinds Compromise, APT29 used the Get-AcceptedDomain PowerShell cmdlet to enumerate accepted domains through an Exchange Management Shell.46 They also used AdFind to enumerate domains and to discover trust between federated domains.4748
G1053 Storm-0501 Storm-0501 has used Windows native utility Nltest nltest.exe for discovery.41
G1046 Storm-1811 Storm-1811 has enumerated domain accounts and access during intrusions.42
S0266 TrickBot TrickBot can gather information about domain trusts by utilizing Nltest.1434

Mitigations

ID Mitigation Description
M1047 Audit Map the trusts within existing domains/forests and keep trust relationships to a minimum.
M1030 Network Segmentation Employ network segmentation for sensitive domains.5.

References


  1. Florio, E.. (2017, May 4). Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack. Retrieved February 14, 2019. 

  2. Metcalf, S. (2015, July 15). It’s All About Trust – Forging Kerberos Trust Tickets to Spoof Access across Active Directory Trusts. Retrieved February 14, 2019. 

  3. Microsoft. (2009, October 7). Trust Technologies. Retrieved February 14, 2019. 

  4. Microsoft. (n.d.). Domain.GetAllTrustRelationships Method. Retrieved February 14, 2019. 

  5. Schroeder, W. (2017, October 30). A Guide to Attacking Domain Trusts. Retrieved February 14, 2019. 

  6. Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016. 

  7. Brian Donohue, Katie Nickels, Paul Michaud, Adina Bodkins, Taylor Chapman, Tony Lambert, Jeff Felling, Kyle Rainey, Mike Haag, Matt Graeber, Aaron Didier.. (2020, October 29). A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak. Retrieved October 30, 2020. 

  8. Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020. 

  9. Kamble, V. (2022, June 28). Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem. Retrieved August 24, 2022. 

  10. McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019. 

  11. The DFIR Report. (2020, November 5). Ryuk Speed Run, 2 Hours to Ransom. Retrieved November 6, 2020. 

  12. The DFIR Report. (2020, October 8). Ryuk’s Return. Retrieved October 9, 2020. 

  13. ss64. (n.d.). NLTEST.exe - Network Location Test. Retrieved February 14, 2019. 

  14. Bacurio Jr., F. and Salvio, J. (2018, April 9). Trickbot’s New Reconnaissance Plugin. Retrieved February 14, 2019. 

  15. Harbison, M. and Renals, P. (2022, July 5). When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors. Retrieved February 1, 2023. 

  16. Kenefick, I. et al. (2022, October 12). Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike. Retrieved February 6, 2023. 

  17. Red Team Labs. (2018, April 24). Hidden Administrative Accounts: BloodHound to the Rescue. Retrieved October 28, 2020. 

  18. Nettitude. (2018, July 23). Python Server for PoshC2. Retrieved April 23, 2019. 

  19. PowerShellMafia. (2012, May 26). PowerSploit - A PowerShell Post-Exploitation Framework. Retrieved February 6, 2018. 

  20. PowerSploit. (n.d.). PowerSploit. Retrieved February 6, 2018. 

  21. Cybereason Nocturnus. (2020, July 16). A BAZAR OF TRICKS: FOLLOWING TEAM9’S DEVELOPMENT CYCLES. Retrieved November 18, 2020. 

  22. Pantazopoulos, N. (2020, June 2). In-depth analysis of the new Team9 malware family. Retrieved December 1, 2020. 

  23. DFIR. (2021, March 29). Sodinokibi (aka REvil) Ransomware. Retrieved July 22, 2024. 

  24. DFIR. (2022, April 25). Quantum Ransomware. Retrieved July 26, 2024. 

  25. Daniel Stepanic & Salim Bitam. (2024, February 23). PIKABOT, I choose you!. Retrieved July 12, 2024. 

  26. Andrew Northern. (2022, November 22). SocGholish, a very real threat from a very fake update. Retrieved February 13, 2024. 

  27. Red Canary. (2024, March). Red Canary 2024 Threat Detection Report: SocGholish. Retrieved March 22, 2024. 

  28. Threat Hunter Team. (2023, April 20). Daggerfly: APT Actor Targets Telecoms Company in Africa. Retrieved July 25, 2024. 

  29. Kuzmenko, A. et al. (2021, September 2). QakBot technical analysis. Retrieved September 27, 2021. 

  30. Batista, J. (2024, June 17). Latrodectus, are you coming back?. Retrieved September 13, 2024. 

  31. Stepanic, D. and Bousseaden, S. (2024, May 15). Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID. Retrieved September 13, 2024. 

  32. Vrabie, V., et al. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved September 8, 2021. 

  33. Mike Stokkel et al. (2024, July 18). APT41 Has Arisen From the DUST. Retrieved September 16, 2024. 

  34. Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020. 

  35. Microsoft Incident Response. (2023, July 6). The five-day job: A BlackByte ransomware intrusion case study. Retrieved December 16, 2024. 

  36. US Federal Bureau of Investigation & US Secret Service. (2022, February 11). Indicators of Compromise Associated with BlackByte Ransomware. Retrieved December 16, 2024. 

  37. Steven Campbell, Akshay Suthar, & Connor Belfiorre. (2023, July 26). Conti and Akira: Chained Together. Retrieved February 20, 2024. 

  38. Jansen, W . (2021, January 12). Abusing cloud services to fly under the radar. Retrieved September 12, 2024. 

  39. Symntec Threat Hunter Team. (2022, November 12). Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries. Retrieved March 15, 2025. 

  40. Chen, J., et al. (2022). Delving Deep: An Analysis of Earth Lusca’s Operations. Retrieved July 1, 2022. 

  41. Microsoft Threat Intelligence. (2024, September 26). Storm-0501: Ransomware attacks expanding to hybrid cloud environments. Retrieved October 19, 2025. 

  42. Microsoft Threat Intelligence. (2024, May 15). Threat actors misusing Quick Assist in social engineering attacks leading to ransomware. Retrieved March 14, 2025. 

  43. DFIR Report. (2021, November 15). Exchange Exploit Leads to Domain Wide Ransomware. Retrieved January 5, 2023. 

  44. Martin Zugec. (2021, July 27). Deep Dive Into a FIN8 Attack - A Forensic Investigation. Retrieved September 1, 2021. 

  45. CISA et al. (2024, July 8). People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action. Retrieved February 3, 2025. 

  46. Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020. 

  47. CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022. 

  48. MSTIC, CDOC, 365 Defender Research Team. (2021, January 20). Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop . Retrieved January 22, 2021. 

  49. DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.