Dumping Domain Controller Hashes via wmic and Vssadmin Shadow Copy
Last updated
Was this helpful?
Last updated
Was this helpful?
This quick labs hows how to dump all user hashes from the DC by creating a shadow copy of the C drive using vssadmin - remotely.
This lab assumes the attacker has already gained administratrative access to the domain controller.
Create a shadow copy of the C drive of the Domain Controller:
Copy the NTDS.dit, SYSTEM and SECURITY hives to C:\temp on the DC01:
Below shows the above command executed on the attacking machine (right) and the files being dumped to c:\temp on the DC01 on the left:
Mount the DC01\c$\temp locally in order to retrieve the dumped files:
Now, of you go extracting hashes with secretsdump as shown here:
A quick note for defenders on the proces ancestry:
and of course commandlines:
as well as service states:
...and of course the lateral movement piece: