πDCSync Attack
π HTB Academy: Active Directory Enumeration & Attacks
π Overview
π Attack Chain Continuation
ACL Enumeration β ACL Abuse Tactics β DCSync Attack β Full Domain Control
(Discovery) (Exploitation) (Compromise) (Game Over)π§ DCSync Theory and Mechanics
What is DCSync?
How DCSync Works
Required Privileges
π Verifying DCSync Privileges
Checking adunn's Group Membership
Verifying Replication Rights
π§ DCSync from Linux - secretsdump.py
Impacket secretsdump.py Overview
Basic DCSync Execution
Advanced secretsdump.py Options
Targeted Extraction
Output File Analysis
Analyzing Extracted Data
NTLM Hash Format
Cleartext Password Analysis
πͺ DCSync from Windows - Mimikatz
Mimikatz DCSync Overview
Authentication with runas.exe
Mimikatz DCSync Execution
DCSync Specific User
Targeting krbtgt for Golden Tickets
π Reversible Encryption Password Storage
Understanding Reversible Encryption
Enumerating Accounts with Reversible Encryption
Using PowerView
Using Get-ADUser
Extracting Cleartext Passwords
With secretsdump.py
With Mimikatz
π― HTB Academy Lab Solutions
Lab Environment Details
π Question 1: "Perform a DCSync attack and look for another user with the option 'Store password using reversible encryption' set. Submit the username as your answer."
Solution Steps:
π Question 2: "What is this user's cleartext password?"
Solution Steps:
π Question 3: "Perform a DCSync attack and submit the NTLM hash for the khartsfield user as your answer."
Solution Steps:
π HTB Academy Lab Summary
Verified Lab Answers:
Key Lab Techniques:
π‘οΈ Detection and Defensive Measures
DCSync Attack Detection
Event Monitoring
Advanced Detection Techniques
Defensive Recommendations
1. Minimize DCSync Privileges
2. Disable Reversible Encryption
3. Implement Advanced Monitoring
4. Privileged Account Management
π Post-DCSync Attack Paths
Immediate Actions After DCSync
1. Pass-the-Hash Attacks
2. Golden Ticket Creation
3. Silver Ticket Attacks
4. Password Cracking Analysis
Establishing Persistence
1. Skeleton Key Attack
2. DSRM Password Abuse
3. Malicious SPN Creation
π Key Takeaways
Technical Mastery Achieved
Professional Skills Developed
Attack Chain Mastery
Defensive Insights
Last updated