githubEdit

DCSync

technique for stealing the Active Directory password database by using the built-in **Directory Replication Service Remote Protocol (DRS**), which is used by Domain Controllers to replicate domain data. use to read NTDS file (read all hashes of users)

circle-exclamation
image.png

  • Using Get-DomainUser to View adunn's Group Membership - SID

  • show privilege using sid

  • Extracting NTLM Hashes and Kerberos Keys Using secretsdump.py

    now we have 3 files with different type

  • Reversible Encryption

    feature which using when service demand password as a clear text

    2025-06-27 15_19_25-reverse_encrypt.png (1206×605) - Brave.png
  • Enumerating Further using Get-ADUser

  • Checking for Reversible Encryption Option using Get-DomainUser

  • Displaying the Decrypted Password

    We will notice the tool decrypted the password and provided us with the cleartext value.


Performing the DSync Attack with Mimikatz

we use runas.exe to perform Mimikatz work with the privilege of target user

Using runas.exe

to use Mimikatz u must to target one user not all domain user like secretsdump.py

using sharpKatz


Last updated