DCSync Attack

DCSync abuses the AD replication protocol (MS-DRSR). By pretending to be a Domain Controller and requesting replication, an attacker with sufficient privileges can pull NT hashes for ALL domain accounts - without logging into the DC or running code on it.

Ready Click Next Step to walk through the DCSync attack chain.
Attack State
Attacker
PASSIVE
DC1
RUNNING
Attack Details
Protocol -
Privilege Used -
Target -
Extracted -
Detection Indicators
Event ID -
Source -
Event Log