Active Directory Attacks
Overview
Local exploitation
The initial foothold must be against a domain account with domain replication privileges (MS-DRSR).
The attacker would upload
mimikatz
and run the DCSync command from thelsadump
module, specifying the targeted domain and user account.
Remote exploitation
The attacker would use
secretsdump.py
to query the DCSync hashes.
Tools needed
Exploitation
Assumption is that the attacker has access to the system through winrm
Local
Remote
Persistence
If you're a domain admin, you can give DCSync rights to any user with PowerView
References
Last updated