{"id":115,"date":"2007-09-12T23:13:18","date_gmt":"2007-09-12T21:13:18","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/"},"modified":"2007-09-12T23:13:18","modified_gmt":"2007-09-12T21:13:18","slug":"ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/","title":{"rendered":"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights)"},"content":{"rendered":"<div class=\"ExternalClass3772068ED4A347BF8D7222F3E62242B1\">\n<p>In certain distributed AD scenario's, Domain Admins group membership or local DC admin privileges are restricted to certain people only. This is a good thing to do, but it requires you to think about certain issues before they happen. <\/p>\n<p>One of these issues is backup and restore. Yes, you can schedule a system state backup on a DC and share the folder that contains the bkf file. The file can be put on tape by someone who doesn't have Domain Admin or DC admin rights. No big deal. Not only a regular backup, but a ASR backup can be scheduled as well (see at the bottom of this document). This type of backup might help you speed up the restore process in case of a failure. I think we all agree that the backup piece is nothing to worry about, even if you don't allow anyone else other than yourself to be admin in the environment. <\/p>\n<p>Restoring the DC to the same hardware is no problem either. You provide a local person with the AD restore password and that person can do an in-place restore, restoring the entire system state, do authoritative restore and so on&#8230; on the freshly installed 2003 server. This works fine, as long as the hardware is kind of identical to the original server hardware that was used to create the backup. After all, if you restore the system state, you basically overwrite the registry as well. So if the new server contains a different network adapter, you'll lose network connectivity after rebooting, and nobody will be able to authenticate against the restored Active Directory controller. The only person who would be able to solve the issue would need to have local admin rights to the server &#8211; which is exactly what the local person doesn't have. (or you can try booting in AD restore mode and clear up any driver issues)&#8230; But there are other ways to bypass the problem. In real life, a restore to the same hardware may be difficult. A Disaster Recovery scenario may require you to get a new server, any server, and get AD up and running again. If you are not prepared for this, you might spend more time trying to recover than building a new DC and migrate all of your clients&#8230; <\/p>\n<p>One of the possible solutions that might help preventing situations like that from ruining your day (night, week and even your carreer) is VMWare. But it requires some preparation <\/p>\n<p><span style=\"text-decoration: underline\"><strong>Preparation by the Enterprise\/Domain Admin <\/strong><\/span><\/p>\n<p>First, you (with admin rights) need to convert a live (physical) machine into a vmware machine. (If your production environment is already running within VMWare, then you can just clone the production server and skip the following procedure and jump right into &quot;When the disaster hits&quot;.) Virtualizing a physical server can be done online (hot) or by using a boot cd (cold). I would recommend you doing a coldboot conversion, because Domain Controllers don't like the agent (live) conversion. Oh and by the way: Domain Controllers don't like vmware snapshots either, so DON'T do it !). In most cases, the conversion itself works fine. But the real trouble is yet to start. In most cases, when booting, some services on the machine won't work well. Either there will be driver\/hardware issues, or you'll have a non-working DC. Anyhow, before even booting the virtualized DC, make sure it is isolated from the rest of the network. By the way : the machine that needs to be virtualized should be the first DC in the domain or even forest (if you have a single domain forest). <\/p>\n<p>The first thing you should do is make sure the Windows server boots. Assuming that it does, install VMWare tools, and then focus on setting\/correcting IP stack\/network interfaces if needed.. You may see the following message when you try to set the IP address on the vmware adapter : <\/p>\n<p>&#160;<a href=\"\/wp-content\/uploads\/2008\/09\/091207-1249-ad2003dcres1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"191\" alt=\"091207_1249_AD2003DCRes1\" src=\"\/wp-content\/uploads\/2008\/09\/091207-1249-ad2003dcres1-thumb.png\" width=\"442\" \/><\/a> <\/p>\n<p>This means that the virtualized system still sees the original (physical) NIC and it's IP properties, so you'll have to remove that adapter from the system prior to continuing : Open a Dos prompt and run <span style=\"font-size: 9pt; color: black; font-family: courier new\">set devmgr_show_nonpresent_devices=1 <\/span>(tx Stijn H. for the tip)<span style=\"font-size: 9pt; color: black; font-family: courier new\"> <\/span>. Next, open devmgmt.msc, enable &quot;Show hidden devices&quot; and remove the non-existing devices. If necessary, clean up the registry by removing the incorrect keys from the registry under <span style=\"font-size: 9pt; font-family: courier new\">HKLM\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Interfaces <\/span>and from <span style=\"font-size: 9pt; font-family: courier new\">HKLM\\System\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Adapters<\/span>. (Use a different IP address if you're not sure which GUID corresponds with the physical interface and which one corresponds with the vmware interface). Reboot the server afterwards. If just removing the keys and setting the IP doesn't work, you may want to try the following things : <\/p>\n<div>\n<table style=\"background: #d3dfee; border-collapse: collapse\" border=\"0\">\n<colgroup>\n<col style=\"width: 641px\" \/><\/colgroup>\n<tbody valign=\"top\">\n<tr>\n<td style=\"border-right: #7ba0cd 1pt solid; padding-right: 7px; border-top: #7ba0cd 1pt solid; padding-left: 7px; padding-bottom: 1px; border-left: #7ba0cd 1pt solid; padding-top: 1px; border-bottom: #7ba0cd 1pt solid\" valign=\"middle\">\n<p><span style=\"font-size: 9pt\"><strong><span style=\"text-decoration: underline\">Clear IP config\/reset stack<\/span>                    <br \/><span style=\"font-family: courier new\">netsh winsock reset                     <br \/>netsh interface ip reset c:\\resetlog.txt                      <br \/><\/span>reboot the server                    <br \/>reconfigure IP settings                    <br \/>reboot the server <\/strong><\/span><\/p>\n<p><span style=\"font-size: 9pt\"><span style=\"text-decoration: underline\"><strong>&quot;WaitForNetwork&quot; entry in registry missing ? <\/strong><\/span>Create it under <span style=\"font-family: courier new\">HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon<\/span> :<strong>                   <br \/><\/strong><span style=\"font-family: courier new\">WaitForNetwork<\/span> DWORD Value : 1 <\/span><\/p>\n<p><span style=\"font-size: 9pt\"><strong><span style=\"text-decoration: underline\">Purge Mup Cache (dfsutil can be found on Windows server CD\/SP1 Support tools)                      <br \/><\/span><span style=\"font-family: courier new\">dfsutil \/PurgeMupCache<\/span><\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&#160;&#160;&#160;&#160;&#160;&#160; <\/p>\n<p>Make sure the DC boots and works fine (open AD U&amp;C, see if netlogon share is working, etc&#8230;) prior to saving the vmdk file. If the vmdk files are ok, put them on a USB drive or something else and leave the file in the remote location. You can find more information about fixing possible issues with your DC in my next blog post : How to restore a Windows 2003 DC using ASR and vmware. (By the way : that blog post will also explain how to rebuild your DC in VMWare, using ASR. So if a vmware convert (coldboot) doesn't work, then you can also rebuild the DC in a vmware environment as well.) <\/p>\n<p>If a conversion does not work and you are confident that a regular system restore will work, open VMWare server and create a new custom virtual machine. Note : this procedure assumes that you have a full backup of the DC that you want to rebuild. Make sure the backup contains the volume that contains the system files, and the System State. Before continuing, make sure the machine does NOT have access to the production environment. Make sure the machine is on an isolated network. Next, create a similar disk layout, install Windows 2003 (with same SP and hotfixes, as standalone server), give it the same hostname and IP. Next, put the backup (bkf) file from the live DC on the system. Do not restore it yet. Make sure the machine has the same services running (DNS, ...).&#160; Next, restore the entire .bkf file &quot;in-place&quot;, overwrite all existing files. This basically overwrites a lot of stuff (registry, ntds, log, sysvol, hal). The hal is a very important component, and unfortunately it is a component that is very sensitive. If you machine doesn't boot, boot with the Windows 2003 server CD-Rom again. Setup will find an existing installation, and you can allow the setup tools to repair the installation.     <br \/>Have a look at <a href=\"https:\/\/web.archive.org\/web\/20130620190349\/http:\/\/support.microsoft.com\/kb\/263532\/en-us\">http:\/\/support.microsoft.com\/kb\/263532\/en-us<\/a> for more help regarding the rebuild of a DC on different hardware (including ways to repair the hal and so on). Reboot and you should be fine. <\/p>\n<p>From this point forward, we'll assume that you (the Domain Admin) have managed to rebuild a DC, in an isolated vmware environment. Again, verify that the DC works well in that standalone vmware environment and keep a safe copy aside in the remote location, waiting for the disaster to strike. <\/p>\n<p>All steps from this point forward do not require Domain Admin or local DC rights. The only privileges you need to give to a remote admin is the Directory Services Restore Mode password. <\/p>\n<p><span style=\"text-decoration: underline\"><strong>When the disaster hits <\/strong><\/span><\/p>\n<p>Now, when the disaster hits and you are left without any DC's, this is what the local person, without Domain admin rights or local admin rights to the DC, needs to do : <\/p>\n<ol>\n<li>set up a fresh machine and install (free) <a href=\"https:\/\/web.archive.org\/web\/20110315090524\/http:\/\/www.vmware.com:80\/download\/server\/\">VMWare server<\/a>. (Don't forget to <a href=\"https:\/\/web.archive.org\/web\/20140205072133\/http:\/\/register.vmware.com:80\/content\/registration.html\">register<\/a> for your free key) <\/li>\n<li>Open the vmware (vmdk) Domain Controller using VMWare server <\/li>\n<li>\n<div>Boot the VM machine in Directory Services Restore mode (Press F8 at boot time)&#160; <br \/><a href=\"\/wp-content\/uploads\/2008\/09\/091207-1249-ad2003backu1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"191\" alt=\"091207_1249_AD2003Backu1\" src=\"\/wp-content\/uploads\/2008\/09\/091207-1249-ad2003backu1-thumb.png\" width=\"378\" \/><\/a> <\/div>\n<p>Log on with the active directory restore mode user &amp; password (usually this is administrator + the password that you've set during dcpromo)         <br \/>Click &quot;OK&quot; at the warning          <br \/><a href=\"\/wp-content\/uploads\/2008\/09\/091207-1249-ad2003backu2.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"96\" alt=\"091207_1249_AD2003Backu2\" src=\"\/wp-content\/uploads\/2008\/09\/091207-1249-ad2003backu2-thumb.png\" width=\"310\" \/><\/a>           <br \/>This will grant the person admin rights to the machine. If there is still something wrong with drivers or so, he (or she) can now install additional drivers or make other modifications. <\/p>\n<\/li>\n<li>Copy a recent ntbackup backup file (.bkf) into the VMWare environment <\/li>\n<li>Restore the System State to an alternate location (don't restore the files in-place !) <\/li>\n<li>Open a prompt and navigate to the folder that contains the restored system state <\/li>\n<li>Copy the ntds.dit file and the .log file from the restored system state (Active Directory folder) on top of the ntds.dit (the one that already exists on the vmware box. Default folder is c:\\windows\\ntds\\ntds.dit) <\/li>\n<li>Reboot. If all goes well, you'll have a working DC. (a lot depends on the quality of your backup, but in some cases, the ntds.dit file is corrupt) . <\/li>\n<li>If you are getting an error when Windows server boots again (at the logon page), boot into AD Restore mode again and do this : <\/li>\n<\/ol>\n<div>\n<table style=\"background: #d3dfee; border-collapse: collapse\" border=\"0\">\n<colgroup>\n<col style=\"width: 388px\" \/><\/colgroup>\n<tbody valign=\"top\">\n<tr>\n<td style=\"border-right: #7ba0cd 1pt solid; padding-right: 7px; border-top: #7ba0cd 1pt solid; padding-left: 7px; padding-bottom: 1px; border-left: #7ba0cd 1pt solid; padding-top: 1px; border-bottom: #7ba0cd 1pt solid\" valign=\"middle\">\n<p><span style=\"font-size: 9pt; font-family: courier new\"><strong>esentutl \/p &quot;c:\\windows\\ntds\\ntds.dit&quot; \/!10240 \/8 \/o<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p style=\"margin-left: 36pt\">(assuming that c:\\windows\\ntds\\ntds.dit is the location where your dit file is) <\/p>\n<p style=\"margin-left: 36pt\">When the file is repaired, run a &quot;ntdsutil files integrity&quot; to verify that the file is ok again. Additionally, if you know what you are doing, you can run an authoritative restore as well <\/p>\n<div>\n<table style=\"background: #d3dfee; border-collapse: collapse\" border=\"0\">\n<colgroup>\n<col style=\"width: 295px\" \/><\/colgroup>\n<tbody valign=\"top\">\n<tr>\n<td style=\"border-right: #7ba0cd 1pt solid; padding-right: 7px; border-top: #7ba0cd 1pt solid; padding-left: 7px; padding-bottom: 1px; border-left: #7ba0cd 1pt solid; padding-top: 1px; border-bottom: #7ba0cd 1pt solid\" valign=\"middle\">\n<p><span style=\"font-size: 9pt; font-family: courier new\">C:\\<strong>ntdsutil<\/strong>                  <br \/>ntdsutil:<strong> Authoritative Restore                   <br \/><\/strong>authoritative restore:<strong> restore database<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p style=\"margin-left: 36pt\"><a href=\"\/wp-content\/uploads\/2008\/09\/091207-1249-ad2003backu3.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" height=\"101\" alt=\"091207_1249_AD2003Backu3\" src=\"\/wp-content\/uploads\/2008\/09\/091207-1249-ad2003backu3-thumb.png\" width=\"278\" \/><\/a>       <br \/>(click YES to continue the restore) <\/p>\n<p style=\"margin-left: 36pt\">Exit ntdsutil (quit &#8211; quit), reboot the machine, you should have a working DC again. <\/p>\n<p>If this vmware machine was not the first DC in your domain, you'll need to seize the fsmo roles to this new DC. You can read how this works in one of my future posts. <\/p>\n<p>Remember : if you still have working DC's at the time the disaster hits you, you should use those DC's and rebuild a new DC (with a regular dcpromo) instead of using this recovery technique. You may need to seize FSMO roles if the DC that died was holding one or more roles, but that should be the hardest part in that scenario. <\/p>\n<p>If you need to put the vmware server on physical hardware afterwards&#8230; well &#8211; read <a href=\"https:\/\/web.archive.org\/web\/20201024100118\/https:\/\/www.vmware.com\/support\/v2p\/index.html\">http:\/\/www.vmware.com\/support\/v2p\/index.html<\/a>. I haven't tried it myself, it does look a bit complex, but it can be done <\/p>\n<p>In case you were wondering how to automate\/schedule a ASR backup ? As with many Microsoft tools, it is based on existing tools with undocumented features\/parameters.     <br \/>Simply use ntbackup with the &quot;asrbackup&quot; option and you'll be fine. <\/p>\n<p>Example : <\/p>\n<div>\n<table style=\"background: #d3dfee; border-collapse: collapse\" border=\"0\">\n<colgroup>\n<col style=\"width: 641px\" \/><\/colgroup>\n<tbody valign=\"top\">\n<tr>\n<td style=\"border-right: #7ba0cd 1pt solid; padding-right: 7px; border-top: #7ba0cd 1pt solid; padding-left: 7px; padding-bottom: 1px; border-left: #7ba0cd 1pt solid; padding-top: 1px; border-bottom: #7ba0cd 1pt solid\" valign=\"middle\">\n<p><span style=\"font-size: 9pt; font-family: courier new\"><strong>C:\\WINDOWS\\system32\\ntbackup.exe asrbackup \/n &quot;Domain Controller ASR Backup&quot; \/d &quot;Domain Controller ASR Backup&quot; \/v:no \/r:no \/rs:no \/hc:off \/m copy \/j &quot;Domain Controller ASR Backup&quot; \/l:f \/f &quot;D:\\Backups\\ASRBackup.bkf&quot;<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p> Make sure the floppy drive contains a diskette when the script runs.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In certain distributed AD scenario's, Domain Admins group membership or local DC admin privileges are restricted to certain people only. This is a good thing to do, but it requires you to think about certain issues before they happen. One of these issues is backup and restore. Yes, you can schedule a system state backup &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights)\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[31,233,26],"tags":[3740,240,32],"class_list":["post-115","post","type-post","status-publish","format-standard","hentry","category-active-directory","category-virtualization","category-windows-server","tag-backup-restore","tag-vmware","tag-active-directory"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights) - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights) - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"In certain distributed AD scenario&#039;s, Domain Admins group membership or local DC admin privileges are restricted to certain people only. This is a good thing to do, but it requires you to think about certain issues before they happen. One of these issues is backup and restore. Yes, you can schedule a system state backup &hellip; Continue reading &quot;AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights)&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2007-09-12T21:13:18+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/09\\\/12\\\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/09\\\/12\\\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\\\/Domain Admin rights)\",\"datePublished\":\"2007-09-12T21:13:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/09\\\/12\\\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\\\/\"},\"wordCount\":1901,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"backup restore\",\"vmware\",\"Active Directory\"],\"articleSection\":[\"Active Directory\",\"Virtualization\",\"Windows Server\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/09\\\/12\\\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/09\\\/12\\\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\\\/\",\"name\":\"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\\\/Domain Admin rights) - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2007-09-12T21:13:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/09\\\/12\\\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/09\\\/12\\\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/09\\\/12\\\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\\\/Domain Admin rights)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights) - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/","og_locale":"en_US","og_type":"article","og_title":"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights) - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"In certain distributed AD scenario's, Domain Admins group membership or local DC admin privileges are restricted to certain people only. This is a good thing to do, but it requires you to think about certain issues before they happen. One of these issues is backup and restore. Yes, you can schedule a system state backup &hellip; Continue reading \"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights)\"","og_url":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2007-09-12T21:13:18+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights)","datePublished":"2007-09-12T21:13:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/"},"wordCount":1901,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["backup restore","vmware","Active Directory"],"articleSection":["Active Directory","Virtualization","Windows Server"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/","url":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/","name":"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights) - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2007-09-12T21:13:18+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2007\/09\/12\/ad-2003-dc-restore-technique-using-vmware-without-having-to-grant-local-dcdomain-admin-rights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"AD 2003 DC Restore Technique using VMWare (without having to grant local DC\/Domain Admin rights)"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":5972,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=115"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/115\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}