**DCShadow** is a post-exploitation technique in which an attacker abuses compromised replication permissions to mimic a domain controller. By doing so, the adversary can push malicious changes into Active Directory (AD) with minimal logging, allowing for stealthy persistence, privilege escalation, or manipulation of AD data.

image.png

MITRE ATT&CK ID: T1207


1- Understanding the Attack


2- Steps of a DCShadow Attack

a. Compromise an Account with Administrative Permissions

b. Mimic a Domain Controller and Inject Malicious Changes

c. Leverage Injected Changes for Further Objectives


3- Key Tools