NTDS.dit Extraction
π― Overview
NTDS.dit (NT Directory Services Directory Information Tree) is the heart of Active Directory - a database containing all domain information including user accounts, groups, security descriptors, and most importantly, password hashes.
"And oh yeah, password hashes" - The golden treasure of domain compromise! π°
π What is NTDS.dit?
NTDS.dit is a database used to store AD data. This data includes:
User information - All domain user accounts and attributes
Group information - Domain groups and membership
Security descriptors - Access control and permissions
Password hashes - NTLM hashes for all domain accounts
Why It Matters for PJPT
Complete domain compromise - Access to every user's password hash
Offline password cracking - No network noise, unlimited time
Lateral movement goldmine - Credentials for every system
Maximum impact demonstration - Shows complete domain control
π Extraction Methods
Method 1: Secretsdump (Recommended)
Method 2: Direct File Access (If you have DC access)
Method 3: Volume Shadow Copy
π Real-World Example Output
Based on the MARVEL domain screenshot, secretsdump reveals:
Key Information Extracted:
Administrator hash:
920ae267e048417fcfe00f49ecbd4b33krbtgt hash:
9b25135001a69d53af33aa6cdc8915735(Golden Ticket material!)Service accounts: SQLService with hash for potential lateral movement
User accounts: fcastle, tstark, pparker - all with crackable hashes
Computer accounts: Domain controllers and workstations
π¨ Hash Cracking Strategy
1. Prioritize High-Value Targets
2. Crack with Hashcat
3. Analyze Password Patterns
π« Golden Ticket Connection
The krbtgt hash from NTDS.dit enables Golden Ticket attacks:
What is a Golden Ticket?
When we compromise the krbtgt account, we own the domain
We can request access to any resource or system on the domain
Golden tickets == complete access to every machine
Creating Golden Tickets
π― PJPT Exam Strategy
Time Allocation (15-20 minutes)
5 minutes: Extract NTDS.dit with secretsdump
10 minutes: Crack high-priority hashes (admin, service accounts)
5 minutes: Document findings and create Golden Ticket
Quick Commands Reference
Documentation Priorities
Screenshot secretsdump output - Shows complete domain compromise
Document cracked passwords - Demonstrates password policy weaknesses
Show Golden Ticket creation - Proves persistent domain access
List accessible systems - Quantify the impact scope
π Advanced Analysis Techniques
Password Policy Assessment
Service Account Discovery
Privileged Account Enumeration
β οΈ Operational Security
Minimizing Detection
Use secretsdump remotely - Avoid placing files on DC
Limit extraction scope - Use
-just-dc-ntlmfor faster extractionClean up artifacts - Remove any temporary files created
Professional Considerations
Document everything - NTDS extraction is high-impact activity
Time-box cracking - Don't spend entire exam on password cracking
Focus on impact - Show what access the hashes provide
π Success Metrics
A successful NTDS.dit extraction includes:
β Complete hash extraction - All domain accounts dumped
β High-value hash cracking - Admin and service accounts cracked
β Golden Ticket creation - Persistent domain access established
β Impact documentation - Clear business impact assessment
β Lateral movement proof - Use hashes to access additional systems
π Integration with Other Attacks
Attack Chain Progression
Initial Access β Privilege Escalation β Domain Admin
NTDS.dit Extraction β Hash Cracking β Golden Ticket
Lateral Movement β Persistence β Impact Assessment
Tool Integration
Secretsdump for extraction
Hashcat for cracking
Mimikatz for Golden Tickets
CrackMapExec for hash validation
PsExec/WMIExec for lateral movement
π Final Notes
NTDS.dit extraction represents the pinnacle of Active Directory compromise. It provides:
Complete visibility into domain security posture
Unlimited offline attack time against password hashes
Golden Ticket capability for persistent access
Maximum impact demonstration for client value
Remember: The goal isn't just to extract the database - it's to demonstrate the complete compromise of domain security and provide actionable intelligence for remediation.
PJPT Success Tip: Focus on high-impact findings rather than cracking every single hash. A few cracked admin passwords and a Golden Ticket demonstrate more value than hundreds of user passwords! π―
Last updated