DCSync is arguably the most powerful Active Directory attack. It doesn't hack the Domain Controller - it impersonates one. By requesting password replication (a legitimate DC function), you can extract any account's password hash, including KRBTGT for Golden Tickets.Related
Think of it like being a new employee at a bank who has "permission to access the vault." You don't break in - you walk through the front door with credentials. The DC thinks you're another DC requesting a routine sync.
No Malware Required
DCSync uses legitimate Windows APIs. It's not a vulnerability to patch - it's how AD replication works. The "vulnerability" is having accounts with excessive replication rights.
How DCSync Works
Required Rights
Checking for DCSync Rights
Performing DCSync
Mimikatz
Impacket (secretsdump.py)
CrackMapExec
Get KRBTGT First
Always extract KRBTGT hash during DCSync. It enables for persistence. Even if you lose access, Golden Tickets work until KRBTGT is reset twice.
Related
Golden Tickets
Escalation to DCSync
Exchange Escalation
WriteDACL Escalation
GenericAll on Domain
Using DCSync Results
Detection & Defense
Exchange Is Dangerous
Exchange Windows Permissions has WriteDACL on the domain by default. This is a well-known escalation path. Microsoft considers this "by design" but many organizations remove this permission.
DCSync Methodology
DCSync Attack Flow
1
EnumerateFind users with DCSync rights
2
EscalateIf needed, exploit path to DCSync rights
3
Extract KRBTGTDCSync krbtgt for Golden Ticket
4
Extract TargetsDCSync specific high-value accounts
5
Dump AllOptionally dump all hashes
6
PersistCreate Golden Ticket with KRBTGT hash
Knowledge Check
Challenges
Key Takeaways
- DCSync impersonates a DC to request password replication
- Requires DS-Replication-Get-Changes rights on domain
- Domain Admins, Enterprise Admins have these by default
- Exchange Windows Permissions can escalate to DCSync
- Always extract KRBTGT for Golden Ticket persistence
- Detected via Event ID 4662 from non-DC sources