WriteDACL over DCSync
Last updated
Last updated
DCSync is an attack that allows an adversary to simulate the behavior of a domain controller (DC) and retrieve password data via domain replication. The classic use for DCSync is as a precursor to a Golden Ticket attack, as it can be used to retrieve the KRBTGT hash.
If our group or user has WriteDacl. We can abuse it by running the following commands. We need valid credentials of an account that has the said privilege.
Then all we need to do is use secretsdump and we should be able to dump all the hashes.
We could also do,