-
Notifications
You must be signed in to change notification settings - Fork 3.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wrong historic secrets returned with LOCAL extraction #395
Comments
Hey @eth0izzle That is indeed strange. Have you replicated the same issue on other systems?.. How did you extracted the DIT file and hives? VSS? |
Not yet. DIT and hive was extracted using ndsutil (which I believe uses VSS). |
Closing. Reopen if somebody experiences the same issue |
I believe I'm seeing the same issue with a DIT extracted from a Server 2016 host using VSS. I did not attempt extraction remotely, so I can't say that the result was different, and I sadly no longer have access to the environment. What I can say, is that out of ~3000 current hashes, I was able to crack ~50%, and from the extracted _history hashes (~45000), I have been able to crack zero (0). Unfortunately, as I hope you can understand, I'm unable to share the files. Let me know if there is any further diagnosis which I can perform.
|
@asolino I have also experienced the same issue on a different machine since my original issue. |
Also, debug output, in case it's helpful, for a particular user's extraction (hashes snipped, however this particular user had 25 historic hashes) [+] Multivalue detected in column ATTc0, returning raw results
[+] Trying to fetch page 16051 (0x7d68000)
[+] Multivalue detected in column ATTl591181, returning raw results
[+] Multivalue detected in column ATTb590468, returning raw results
[+] Multivalue detected in column ATTc0, returning raw results
[+] Multivalue detected in column ATTk590772, returning raw results
[+] Multivalue detected in column ATTm131282, returning raw results
[+] Multivalue detected in column ATTm-1610706279, returning raw results
[+] Multivalue detected in column ATTm-2066838235, returning raw results
[+] Multivalue detected in column ATTm-2029542006, returning raw results
[+] Multivalue detected in column ATTj-1770041216, returning raw results
[+] Entering NTDSHashes.__decryptHash
[+] Decrypting hash for user: John Doe
[snipped_hashes]
[+] Leaving NTDSHashes.__decryptHash
[+] Entering NTDSHashes.__decryptSupplementalInfo
[+] Leaving NTDSHashes.__decryptSupplementalInfo |
Can this issue be reopened? When testing on Server 2016, I am also experiencing this. I've tested a few different scenarios. I set a user account with a password "Password123", or NTLM:
Run some more times:
The hash for |
Please continue on #656 since looks like it's all related to the same bug. |
It would be good @BraveLittleRoaster to test the workaround proposed on #656 to check if that fixes the issue |
This can get replicated fairly easy. I've had this issue every time via deploying in Server 2016 & Server 2019 on AWS. Deploy a new instance of either, install AD, load some users then start resetting their passwords to known bad NTLM hashes. If you dump the DIT file with ntdsutil.exe or VSS it will always have different hash histories every time. |
Hello,
I have a test server running Server 2016 with a standard AD setup and two users: noreset who has never reset thier password, and onereset who has reset their password once.
When extracting remotely everything works as expected:
The NTLM hash for
acme.local\onereset_history0
is as expected, c0720d115b8b326aca0d9b95f0eca86e.But extracting locally using SYSTEM and ntds.dit files (extracted from the same system) gives me:
Firstly you will see the noreset user has two history passwords. Secondly onereset has 3 historic passwords, and neither of the NTLM hashes are correct - they don't even match the remote extraction (c0720d115b8b326aca0d9b95f0eca86e) from above.
I have no idea why this is happening. Can anybody shed any light?
The text was updated successfully, but these errors were encountered: