πΎ Overview
The DCSync permission in AD allows a user to emulate a DC to dump all password hashes from the domain controller. This attack exploits the replication functionality between domains controllers, which canβt be disabled.
π Discovery
Required permissions:
- DS-Replication-Get-Changes
- Replicating Directory Changes All
- Replicating Directory Changes In Filtered Set
Default groups with these permissions:
- Domain Admins
- Enterprise Admins
- Administrators
- Domain Controllers
π Exploitation
Local
Remote
β¨ Post-Exploitation
Once NTLM hashes are obtained, they can either be used in a pass the hash attack, or cracked offline.
π Resources
π Hyperlink | βΉοΈ Info |
---|---|
PowerSploit | Contains Invoke-Mimikatz |
Mimikatz | Versatile tool for pth, ptt, golden tickets, dcsync, pulling credentials, etc. |