DCSync is an attack that allows an adversary to simulate the behavior of a domain controller (DC) and retrieve password data via domain replication. The classic use for DCSync is as a precursor to a Golden Ticket attack, as it can be used to retrieve the KRBTGT hash.
If our group or user has WriteDacl. We can abuse it by running the following commands. We need valid credentials of an account that has the said privilege.