I published a sample Active Directory database file (ntds.dit) to practise hash extraction and password cracking. And I published several how-to blog posts.
Here is an overview:
Practice ntds.dit File Part 2: Extracting Hashes
Practice ntds.dit File Part 3: Password Cracking With hashcat – Wordlist
Practice ntds.dit File Part 4: Password Cracking With hashcat – Brute-force
Practice ntds.dit File Part 5: Password Cracking With hashcat – LM NTLM
Practice ntds.dit File Part 6: Password Cracking With John the Ripper – Wordlist
Practice ntds.dit File Part 7: Password Cracking With John the Ripper – Brute-force
Practice ntds.dit File Part 8: Password Cracking With John the Ripper – LM NTLM
Video: ntds.dit: Extract Hashes With secretsdump.py
Practice ntds.dit File Part 9: Extracting Password History Hashes