DSRM Credentials
DSRM Credentials
There is a local administrator account inside each DC. Having admin privileges in this machine you can use mimikatz to dump the local Administrator hash. Then, modifying a registry to activate this password so you can remotely access to this local Administrator user. First we need to dump the hash of the local Administrator user inside the DC:
Then we need to check if that account will work, and if the registry key has the value "0" or it doesn't exist you need to set it to "2":
Then, using a PTH you can list the content of C$ or even obtain a shell. Notice that for creating a new powershell session with that hash in memory (for the PTH) the "domain" used is just the name of the DC machine:
More info about this in: https://adsecurity.org/?p=1714 and https://adsecurity.org/?p=1785
Mitigation
Event ID 4657 - Audit creation/change of
HKLM:\System\CurrentControlSet\Control\Lsa DsrmAdminLogonBehavior
Last updated