Credentials dump using DCSync attack
Requirements:
- Current user needs DCSync permissions (see below) on a Domain Object granted. Domain Admins, Enterprise Admins, Administrators and Domain Controllers groups have the required permissions by default.
- Access to LDAP service on DC.
A DCSync attack exploits a legitimate function of Active Directory to steal password data from Domain Controller database. The DCSync simulates the behavior of a Domain Controller and asks other DC to replicate information using the Directory Replication Service Remote Protocol (MS-DRSR) and its GetNCChanges function. In response a DC returns the replication data that includes password hashes. Most often, the place from which DCSync is executed is not restricted, so you just need to have the right user.
Required DCSync permissions on the Domain Object:
- Replicating Directory Changes
- Replicating Directory Changes All
- Replicating Directory Changes In Filtered Set
Windows:
WARNING: It assumes that you are the user who has DCSync permissions and you have valid TGT or TGS for DC LDAP service in memory. It might be required to become someone else (e.g. domain admin) using Delegation Abuse, Pass-the-Ticket or RunAs techniques.
Linux:
Enumerate users or groups with DCSync permissions
Active Directory module:
PowerView module: