Attacking Active Directory & NTDS.dit
June 06, 2024
Last updated
June 06, 2024
Last updated
I just used the msfconsole because using crackmapexec is taking way too long bruteforcing smb
THE OTHER WAY TO GET THE NTDS.dit
Log in to the user via wsman protocol or winrm or windows remote management using evil-winrm
First we have to look for the current local group membership that our user have
Then check for the privilege of our user including domain
Creating a drive where the AD is initially installed using vssadmin
Now we are going to use cmd to copy the ntds.dit from shadow copy
First we have to make a directory named NTDS
In our attacker machine we have to create a smb server that will receive the ntds file
Now just move the ntds file from windows to our attacker machine
Now we can view the NTDS.dit file in our attacker machine