Domain Controller

As explained before, New Technologies Directory Services (NTDS) is a database containing all Active Directory data, including objects, attributes, credentials, etc. Located in C:\Windows\NTDS by default, and it is encrypted to prevent data extraction from a target machine.


Local Dumping (No Credentials)

To successfully dump the content of the NTDS file we need the following files:

  • C:\Windows\NTDS\ntds.dit

  • C:\Windows\System32\config\SYSTEM

  • C:\Windows\System32\config\SECURITY

We can use this Powershell one-liner to dump the NTDS file using the Ntdsutil tool in the C:\temp directory

ntdsutil.exe 'ac i ntds' 'ifm' 'create full c:\temp' q q

Inside both of those folders contain the required files we need. In a usual case, we would transfer them on our attacking machine and retrieve the NTLM hashes using impacket's secretsdump


Remote Dumping (With Credentials)

In the previous section, we discussed how to get hashes from memory with no credentials in hand. In this task, we will be showing how to dump a system and domain controller hashes remotely, which requires credentials, such as passwords or NTLM hashes. We also need credentials for users with administrative access to a domain controller or special permissions as discussed in the DC Sync section.

Then, attempt to crack it using Hashcat

Last updated