Obj 11 DSRM
Task - Use Domain Admin privileges obtained earlier to abuse the DSRM credential for persistence.
We can persist with administrative access on the DC once we have Domain Admin privileges by abusing the DSRM administrator. With the domain admin privileges obtained earlier, run the following commands on the DC to open a PowerShell remoting session. As always, remember that we could use other tools like SafetyKatz, BetterSafetyKatz etc.
Start a new session on the DC
Disable AMSI on the DC
Back on the host machine Load Mimikatz into memory on the $sess
Enter back into the PSSession on the DC
Dump the creds of the DC with Mimikatz
The DSRM administrator is not allowed to logon to the DC from network. So we need to change the logon behavior for the account by modifying registry on the DC. We can do this as follows:
Modify the registry on the DC
Now from our local system we can just pass the hash for the DSRM administrator:
Pass the hash
We can now access the dcorp-dc directly from the new session.
Access the DC
Last updated