Windows domain password attacks
In this recipe, we will try to crack the active directory database from a Windows domain controller. We will assume you have already recovered the needed files, the system file, and NTDS.dit
files from the computer through other exploitation means.
Getting ready
Let's ensure the following prerequisites:
- Your Kali machine is powered up
- Your domain controller has some sample accounts on it
- You have collected the system file and the
NTDS.dit
files through other means
How to do it...
We will now recover passwords from a windows domain controller:
- Open up a terminal by clicking on the terminal icon.
- We need to install a couple of packages to assist us with the cracking of the Active Directory (AD) Domain. Specifically, these are
libexedb
andntdsxtract
. - If you do not already have a logon to GitHub, open your browser and go to
www.github.com
and register as a user. - To download
libexedb
enter the following commands:
cd apt install autoconf automake autopoint...