Resume
GitHub
LinkedIn
Mail
Trash
Dumping NTDS.dit

What?
A database used to store AD data. This data includes:

  • User information
  • Group information
  • Security description
  • Password hashes

First time doing this btw:
Pasted image 20251226193619

Lab

Command:
secretsdump.py MARVEL.local/hawkeye:'Password1@'@192.168.138.136

And this dumps the NTDS.dit too along with so much more
but to only get NTDS.dit:
->secretsdump.py MARVEL.local/hawkeye:'Password1@'@192.168.138.136 -just-dc-ntlm

Note:

remeber just take the NT (LM:NT) part of the hash for cracking

Tip:

-> Copy everything on a hash from the dump and paste it in excel. Then Do “text to column” and put : as the delimiter. This will put the NT part and the LM part in seperate columns along with some more unwanted columns. Just delete them columns:) So now I have just this:
Pasted image 20251226200719

-> Now I would just copy the whole hashes column and put it in a .txt file for cracking. EZ

-> Also after cracking the hashes, paste the whole --show result from hashcat and put it on a different sheet and then do a vlookup to show them on sheet 1. (This last tip is for when you have a lots of users and hashes and passwords)

-> AND, PC passwords are not that useful when cracking, so its best not to try and crack them (maybe to save time). ONLY crack user account hashes.