NTDS.dit

Overview

Evidence: NTDS.dit Description: Collect Active Directory NTDS Database Category: System Platform: Windows Short Name: ntdsdit Is Parsed: No - Raw ESE database Sent to Investigation Hub: Yes Collect File(s): No

Background

NTDS.dit is the Active Directory database file that stores all Active Directory data including user accounts, passwords, groups, and domain configuration. This file is only present on Windows Domain Controllers.

The database contains password hashes, Kerberos keys, and other critical Active Directory information. Compromise of NTDS.dit is a critical security incident as it contains credentials for all domain accounts.

Data Collected

Field
Description
Example

Type

File type

NTDSDatabase

Name

File name

ntds.dit

SourcePath

Original file path

C:\Windows\NTDS\ntds.dit

FilePath

Relative path in evidence

Files/ntds.dit

FileSize

File size in bytes

10485760000

Collection Method

This collector collects the Active Directory database from:

  • C:\Windows\NTDS\ntds.dit

The file is collected using driver or NTFS raw access as it is typically locked by Active Directory services.

Usage

NTDS.dit is critical for Active Directory forensics and compromise assessment. Investigators use this data to extract domain user accounts and groups, recover password hashes for offline cracking, analyze Active Directory configuration, investigate domain compromise, track account modifications, and perform post-breach Active Directory analysis.

Known Limitations

  • Only present on Domain Controllers

  • Can be very large (multi-GB on large domains)

  • File is locked by Active Directory service

  • Requires specialized tools to parse (ESE database format)

  • Contains highly sensitive credential data

Notes

NTDS.dit is one of the most sensitive files in a Windows domain. Extraction tools like secretsdump.py or DSInternals can extract password hashes and Kerberos keys. Handle with extreme care and appropriate security measures.

Last updated

Was this helpful?