NTDS.dit (NT Directory Services Directory Information Tree) is the heart of Active Directory - a database containing all domain information including user accounts, groups, security descriptors, and most importantly, password hashes.
"And oh yeah, password hashes" - The golden treasure of domain compromise! π°
π What is NTDS.dit?
NTDS.dit is a database used to store AD data. This data includes:
User information - All domain user accounts and attributes
Group information - Domain groups and membership
Security descriptors - Access control and permissions
Password hashes - NTLM hashes for all domain accounts
Why It Matters for PJPT
Complete domain compromise - Access to every user's password hash
Offline password cracking - No network noise, unlimited time
Lateral movement goldmine - Credentials for every system
Maximum impact demonstration - Shows complete domain control
π Extraction Methods
Method 1: Secretsdump (Recommended)
Method 2: Direct File Access (If you have DC access)
Method 3: Volume Shadow Copy
π Real-World Example Output
Based on the MARVEL domain screenshot, secretsdump reveals:
NTDS.dit Extraction β Hash Cracking β Golden Ticket
Lateral Movement β Persistence β Impact Assessment
Tool Integration
Secretsdump for extraction
Hashcat for cracking
Mimikatz for Golden Tickets
CrackMapExec for hash validation
PsExec/WMIExec for lateral movement
π Final Notes
NTDS.dit extraction represents the pinnacle of Active Directory compromise. It provides:
Complete visibility into domain security posture
Unlimited offline attack time against password hashes
Golden Ticket capability for persistent access
Maximum impact demonstration for client value
Remember: The goal isn't just to extract the database - it's to demonstrate the complete compromise of domain security and provide actionable intelligence for remediation.
PJPT Success Tip: Focus on high-impact findings rather than cracking every single hash. A few cracked admin passwords and a Golden Ticket demonstrate more value than hundreds of user passwords! π―
# Direct extraction from Domain Controller
secretsdump.py MARVEL.local/pparker:'Password2'@192.168.138.132 -just-dc-ntlm
# Using hash instead of password
secretsdump.py -hashes :ntlm_hash MARVEL.local/admin@192.168.138.132 -just-dc-ntlm
# Extract with user information
secretsdump.py MARVEL.local/pparker:'Password2'@192.168.138.132 -just-dc
# Copy NTDS.dit and SYSTEM hive
copy C:\Windows\NTDS\ntds.dit C:\temp\ntds.dit
reg save HKLM\SYSTEM C:\temp\system.hive
# Extract locally
secretsdump.py -ntds ntds.dit -system system.hive LOCAL