Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Overview
Windows delegated Managed Service Accounts (dMSAs) and group Managed Service Accounts (gMSAs) derive their passwords on the Domain Controller (DC) using a KDS (Key Distribution Service) Root Key and a per‐account ManagedPasswordID (GUID). The password is computed as an AES256‐HMAC of the SID and ManagedPasswordID, then Base64‐encoded and stored in the
msDS-ManagedPassword
attribute.Golden dMSA Attack
By extracting the DC’s KDS Root Key and enum...
🔧 Technical Details
Golden dMSA Attack: Allows offline derivation of any Active Directory delegated or group Managed Service Account password by extracting the DC’s KDS Root Key and computing the AES256‐HMAC of the account SID and ManagedPasswordID, bypassing all live Kerberos requests.
Key Material Extraction: Dump the KDS Root Key from a Domain Controller (requires Enterprise Admin or SYSTEM) via Volume Shadow Copy, registry hive export (
reg save HKLM\\SECURITY🤖 Agent Actions
Added comprehensive coverage of the Golden gMSA/dMSA attack:
Created new file
src/windows-hardening/active-directory-methodology/golden-dmsa-gmsa.md
• Explains MSA password derivation, attack prerequisites, 4-phase workflow, tooling, detection & mitigation.
• Includes detailed command examples with GoldenDMSA, mimikatz, etc.
• Provides references section with blog and related research links.
Updated Active-Directory methodology README
• Inserted internal cross-reference to the new page inside the “Compromise any gMSA in the forest” subsection for easy navigation.
These changes document the latest offline Managed Service Account password-derivation technique and integrate it into existing AD attack paths.
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.