This attack requires to have compromised a high privilege user as descbrided in Theory
Theory
In production environments, domains typically rely on more than one domain controller to provide redundancy. The Directory Replication Service (DRS) Remote Protocol1 uses replication2 to synchronize these redundant domain controllers. A domain controller may request an update for a specific object, like an account, using the IDL_DRSGetNCChanges3 API.
The DC receiving the update request doesn't check if the request comes from a known DC.
The goal of this attack is to send a road request update to obtain the passwords of all the users.
To do this, our user must have the following privileges =>Replicating Directory Changes, Replicating Directory Changes All, and Replicating Directory Changes in Filtered Set
Members of the Domain Admins, Enterprise Admins, or the Administrators group at the domain level have those rights and privileges.
Attack from domain-joined Windows
We launch mimikatz and run the attack and get the hash of the Administrator for example: