Skip to content

Commit 2ba27dc

Browse files
committed
Tools to DCSYnc
1 parent 2511d3a commit 2ba27dc

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

Windows Hardening/Active Directory/DCSync.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,13 @@ The DCSync attack simulates the behaviour of a Domain Controller and asks other
44
## Prerequisites
55
- Having the following permission: **Replicate Directory Changes**, **Replicate Directory Changes All**
66

7+
## Tools
8+
- [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1)
9+
- [mimikatz](https://github.com/gentilkiwi/mimikatz)
10+
711
# Enumeration
8-
Check permission with [*PowerView](https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon)
912
```powershell
13+
# PoverView - Check Permission
1014
Get-ObjectAcl -DistinguishedName "dc=dollarcorp,dc=moneycorp,dc=local" -ResolveGUIDs | ?{($_.ObjectType -match 'replication-get') -or ($_.ActiveDirectoryRights -match 'GenericAll') -or ($_.ActiveDirectoryRights -match 'WriteDacl')}
1115
```
1216

@@ -31,4 +35,3 @@ Add-ObjectAcl -TargetDistinguishedName "dc=company,dc=corp,dc=local" -PrincipalS
3135
# References
3236
- [https://book.hacktricks.wiki/en/windows-hardening/active-directory-methodology/dcsync.html](https://book.hacktricks.wiki/en/windows-hardening/active-directory-methodology/dcsync.html)
3337
- [https://www.semperis.com/blog/dcsync-attack/](https://www.semperis.com/blog/dcsync-attack/)
34-
- [*PowerView](https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon)

0 commit comments

Comments
 (0)