https://ctf-writeup.revers3c.com/challenges/Vulnerable_Machine/Blackfiled/index.html
ntds.dit lies under C:\Windows\ntds\ntds.dit
ntds.dit is very important file of AD. because it contains all the users hashes, krbtgt hashes etc.
this file is encrypted using system hive registry key.
if we can extract it then we will get golden ticket along with so many things.
using robocopy you cannot copy it because it is in use by the operating system when the system is running.
quick note: there is a directory in windows where normal users can write.
windows\system32\spool\drivers\color
but we can still copy the content of ntds.dit using a technology called shadow copy. see the following link:
now we need hklm system reg key to decrypt the ntds.dit
Comments
Post a Comment