Hijacking Someone Else’s DCSync

Jams all day: Introduction So you’re on a network doing a pentest. You’ve escalated privileges and it’s time to extract hashes from the DC. DCSync attacks are widely known and widely detected on. What if there was a way to perform a DCSync without executing the attack or triggering an alert for the activity? We’d […]