GSR-IconBannerAd_v1d

Security Advisories

Trustwave Press Releases

« TrustKeeper Scan Engine Update - November 14, 2013 | Main | Malicious shells; Established != Active »

21 November 2013

Comments

Amazing post, i really admire spiderlabs researches. I learned a lot.

Last week I did a pentest and I was able to obtain NTDS.dit file using this technique that I wrote in my personal blog:

http://neobits.org/extracting-ntds-dit-from-a-live-domain-controller-the-easy-way/

I just wanna share it with you, I guess this way is easier than creating a volume shadow copy.

Greetings

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been posted. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment