DCSync is an attack that allows an adversary to simulate a domain controller by abusing the Directory Replication Service Remote Protocol (MS-DRSR). By doing so, the attacker can request and retrieve sensitive password data including NTLM hashes and the KRBTGT account hash from other domain controllers.

Screenshot 2024-12-05 225820.png

MITRE ATT&CK ID: T1003.006


1- Understanding the Attack


2- Attack Execution

Screenshot 2025-02-24 064736.png

a. Compromise an Account with Replication Permissions

b. Request Replication Data Using Mimikatz

c. Utilize the Retrieved Credentials