Shadow Copies

The Volume Shadow Service (VSS) in Windows allows for the creation of snapshots of volumes or files. An attacker can leverage the vshadow utility to create a shadow copy of the AD database, ntds.dit, from a DC. After extracting the database and SYSTEM hive, they can use tools like impacket-secretsdump to dump user credentials, including NTLM hashes and Kerberos keys, offline.

The SYSTEM Hive is a registry file that stores system-level information in Windows, which is required to successfully decrypt the ntds.dit database for credential extraction.

In our scenario we will login to DC1 as jeffadmin.

Create a shadow copy of the C: drive on DC1 with vshadow.exe (-nw disables writers, -p stores the copy on disk).

vshadow.exe -nw -p C:

DCSync with mimikatz is a stealthier method for extracting user hashes from a DC without leaving as obvious a trail.

Last updated

Was this helpful?