Get-Changes
Configuring
Prerequisite
WriteDaclConfiguring
Nothing need to be configured to abuse this since we set the ACL's of the object during the attack in the "WriteDacl" section.
Attacking
How it works
With the privileges DS-Replication-Get-Changes and DS-Replication-Get-Changes-All rights it is possible to execute the DCSync attack. Which will sync all(or a specifichash) of the users.
Tools
Executing the attack
Login to
DATA01
with the usernamebank\secure_admin
and the passwordrFKbUJrDu$sz*36ffKr6
.In the page DACL-Abuses I showed you how to check for ACL's using BloodHound. In this attack we will abuse the ACL
secure_admin
has on the domain object:
3. Open PowerShell as an Administrator and download an amsi and MimiKatz into memory.
4. Execute the DCSync attack with MimiKatz and retrieve the Administrator
hash with the following command:
Cleanup
Login to
DC03
asAdministrator
with the passwordWelcome01!
.Open "Active Directory Users and Computers" and open the "Computers" section and open the "Properties" for the domainobject
secure.local
. Make sure the "Advanced Features" are enabled.Open the "Security" tab and select the
secure_admin
user. Then click "Remove"
4. Then click "Apply" and "OK".
Defending
Recommendations
Detection
References
Last updated