DCSync
Credentials to look for:
1) Local admin rights on several machines
2) Service accounts that have delegate permissions
3) Accounts used for privileged AD Services (SCCM,WSUS,Exchange,etc.)
mimikatzlsadump::dcsync /domain:DOMAIN /user:OUR_LOW-PRIVILEGE_AD_USERNAMEPrivileges: Replicate Directory Changes, Replicate Directory Changes All, Replicated Directory Changes in Filtered Set
Usually, Administrators, Domain Admins and Enterprise Admins have this privilege in their accounts.
mimikatz.exeprivilege::debugDCSync every single account
DCSync Remote
Secretsdump.py on an account that is synced with the domain controller to dump hashes to PtH attack.
DCSync
Command
Description
Last updated