DCSync Attack
Impersonating a Domain Controller to replicate credentials.
Overview
DCSync utilizes the Directory Replication Service Remote Protocol (MS-DRSR) to simulate the behavior of a Domain Controller. This allows an attacker to ask the DC to replicate information, including password hashes.
Execution
secretsdump.py domain/user:password@IP -just-dc-user krbtgt