<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Domain Trust — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/domain-trust/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/domain-trust/feed.xml" rel="self" type="application/rss+xml"/><item><title>Enumerating Domain Trusts via DSQUERY.EXE</title><link>https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</guid><description>Adversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.</description><content:encoded><![CDATA[<p>The <code>dsquery.exe</code> utility is a command-line tool in Windows used to query Active Directory. Attackers may leverage <code>dsquery.exe</code> to discover domain trust relationships within a Windows environment, mapping out potential lateral movement paths. This discovery is often an early stage in reconnaissance, before an attacker attempts to move laterally to other systems. This activity can be detected across various endpoint detection platforms including Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne. This activity is not inherently malicious, as administrators also use it for legitimate purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to enumerate domain trusts.</li>
<li>The command execution is logged by endpoint detection and response (EDR) solutions or Windows Security Event Logs.</li>
<li>The attacker parses the output of the <code>dsquery.exe</code> command to identify trusted domains and their attributes.</li>
<li>The attacker uses the discovered trust information to plan lateral movement strategies.</li>
<li>The attacker attempts to authenticate to other systems within the trusted domains using stolen credentials or other exploits.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts enables attackers to map out the Active Directory environment and identify potential pathways for lateral movement. While the enumeration itself is low impact, it facilitates subsequent actions like credential theft, privilege escalation, and data exfiltration. This can lead to widespread compromise across the organization, impacting numerous systems and sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Enumerating Domain Trusts via DSQUERY.EXE&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any execution of <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to identify potentially malicious activity.</li>
<li>Monitor process execution events for <code>dsquery.exe</code> to detect suspicious command-line arguments and execution patterns.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain-trust</category><category>windows</category></item><item><title>NLTEST.EXE Used for Domain Trust Discovery</title><link>https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</link><pubDate>Thu, 11 Jan 2024 17:49:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</guid><description>Adversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.</description><content:encoded><![CDATA[<p>The <code>nltest.exe</code> utility is a command-line tool used to manage and troubleshoot Windows NT domains. While legitimate domain administrators may use this utility for information gathering, adversaries can also abuse it to enumerate domain trusts and gain insight into trust relationships, which exposes the state of Domain Controller (DC) replication within a Windows NT Domain. This activity is more suspicious in environments with Windows Server 2012 and newer, where its usage is less common for legitimate purposes. Attackers can leverage this information to facilitate lateral movement and other malicious activities within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>nltest.exe</code> with specific arguments such as <code>/DOMAIN_TRUSTS</code>, <code>/DCLIST:*</code>, <code>/DCNAME:*</code>, <code>/DSGET*</code>, <code>/LSAQUERYFTI:*</code>, <code>/PARENTDOMAIN</code>, or <code>/BDC_QUERY:*</code> to enumerate domain trusts.</li>
<li>The <code>nltest.exe</code> utility queries the Active Directory to gather information about domain trusts, domain controllers, and other domain-related information.</li>
<li>The attacker parses the output of <code>nltest.exe</code> to identify trust relationships, domain controllers, and other relevant information about the domain infrastructure.</li>
<li>The attacker uses the gathered information to map out potential lateral movement paths within the environment.</li>
<li>The attacker leverages discovered trust relationships to authenticate to other domains or resources.</li>
<li>The attacker moves laterally to other systems or domains, leveraging the discovered trust relationships and compromised credentials.</li>
<li>The attacker establishes persistence and continues to perform malicious activities, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts via <code>nltest.exe</code> can provide attackers with valuable information to facilitate lateral movement and escalate privileges within a Windows NT Domain. This can lead to the compromise of sensitive data, disruption of critical services, and ultimately, a complete takeover of the affected environment. While the specific number of victims and sectors targeted are unknown, the impact can be significant for organizations relying on Active Directory for authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for <code>nltest.exe</code> with command-line arguments indicative of domain trust discovery, using the provided Sigma rule.</li>
<li>Investigate any instances of <code>nltest.exe</code> execution, especially when initiated by non-administrative users or from unusual locations, as identified by the Sigma rule.</li>
<li>Enable Sysmon process creation logging to capture the necessary process execution data for the provided Sigma rule.</li>
<li>Review and restrict the use of <code>nltest.exe</code> to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain trust</category><category>lateral movement</category><category>windows</category></item></channel></rss>