mgeeky-Penetration-Testing-.../red-teaming/Dealing with LAPS using Pow...

21 lines
678 B
Markdown
Raw Permalink Normal View History

2019-01-06 14:25:50 +01:00
### Dealing with LAPS using PowerView 3.0+
**Finds all LAPS-enabled machines**
```
Get-DomainComputer -LDAPFilter '(ms-Mcs-AdmPwdExpirationtime=*)'
```
**Enumerates all users/groups who can view LAPS password on specified `LAPSCLIENT.test.local` machine**
```
Get-DomainComputer LAPSCLIENT.test.local |
Select-Object -ExpandProperty distinguishedname |
ForEach-Object { $_.substring($_.indexof('OU')) } | ForEach-Object {
Get-DomainObjectAcl -ResolveGUIDs $_.ObjectDN
} | Where-Object {
($_.ObjectAceType -like 'ms-Mcs-AdmPwd') -and
($_.ActiveDirectoryRights -match 'ReadProperty')
} | Select-Object -ExpandProperty SecurityIdentifier | Get-DomainObject
```