You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
impacket version: 0.11.0
Python version: 3.11.6
Target OS: Windows Server 2019 (10.0.17763 N/A Build 17763)
Issue
I am trying to dump the AES256 key of a RODC's Kerberos service account cached in LSA on a RODC using secretsdump. If I use the default DRSUAPI mode I get the error "Unknown DCE RPC fault status code: 00000057". If I use the VSS mode I can dump the NTLM hash of the service account but I get no AES256 key. Mimikatz can successfully dump the AES256 key but I would prefer to not use that.
I am aware that it is not possible to DCSync a RODC but that is not what I do. I am dumping LSA.
Thanks!
The text was updated successfully, but these errors were encountered:
Configuration
impacket version: 0.11.0
Python version: 3.11.6
Target OS: Windows Server 2019 (10.0.17763 N/A Build 17763)
Issue
I am trying to dump the AES256 key of a RODC's Kerberos service account cached in LSA on a RODC using secretsdump. If I use the default DRSUAPI mode I get the error "Unknown DCE RPC fault status code: 00000057". If I use the VSS mode I can dump the NTLM hash of the service account but I get no AES256 key. Mimikatz can successfully dump the AES256 key but I would prefer to not use that.
I am aware that it is not possible to DCSync a RODC but that is not what I do. I am dumping LSA.
Thanks!
The text was updated successfully, but these errors were encountered: