DSRM
If we have admin privileges on a DC, we can dump local admin hash and then activate this local admin user to remotely access it.
DSRM (Directory Services Restore Mode)
When the AD domain services does not boot, it uses a safe mode called DSRM that uses a local administrator user on DC called "Administrator" who's password is the DSRM password.
DSRM password (SafeModePassword) is required when a server is promoted to DC and it is rarely changed. After altering the config on the DC, it is possible to pass the NTLM hash of this user to access the DC.
This is longest persistence method.
The domain DPAPI backup key can be used to decrypt DPAPI protected credentials for any user.
Dump credentials (requires DA privs)
Compare the Administrator hash with the Administrator hash of below command:
First one is the DSRM local Adminstrator.
Since it is local admin of the DC, we can pass the hash to authenticate.
Before PTH, we need to change the Logon Behavior for the DSRM account (very noisy)
Pass the hash
Last updated