0
of AES-CFB8Zero Logon to bypass authentication on the Domain Controller's Machine Account -> Run Secretsdump.py
to dump credentials -> Crack/Pass Domain Admin Hashes -> ??? -> Profit
sequenceDiagram
participant Client
participant Server
Client ->> Server: Client challenge
Server ->> Client: Server challenge, Session Key = KDF(secret, challenges)
Client ->> Server: Client credential, Encrypt(K_sess, client challenge)
Server ->> Client: Client credential, Encrypt(K_sess, client challenge)
Client ->> Server: Signed + sealed with session key: Procedure call with authenticator
sequenceDiagram
participant Client
participant Server
Client ->> Server: NetrServerReqChallenge (challenge=0000...00)
Server ->> Client: Server Challenge
Client ->> Server: NetrServerAuthenticate3 (identity=DC; credential=0000...00; sign/seal=0)
Server ->> Client: OK
Client ->> Server: NetrServerPasswordSet2 (target=DC; authenticator=0000...00; timestamp=0; enc.password=0000...00)
0
as Nonce to domain-controllerNetrServerAuthenticate3 method is generated as NetLogon credentials. Contains the following
\x00
NetrServerAuthenticate is received by server. Responds success if positive to the client.
Social_engineering