1
0
mirror of https://github.com/mgeeky/Penetration-Testing-Tools.git synced 2024-12-24 09:59:45 +01:00
mgeeky-Penetration-Testing-.../red-teaming/Dealing with LAPS using PowerView 3.0+.md
2019-01-06 14:25:50 +01:00

21 lines
678 B
Markdown

### Dealing with LAPS using PowerView 3.0+
**Finds all LAPS-enabled machines**
```
Get-DomainComputer -LDAPFilter '(ms-Mcs-AdmPwdExpirationtime=*)'
```
**Enumerates all users/groups who can view LAPS password on specified `LAPSCLIENT.test.local` machine**
```
Get-DomainComputer LAPSCLIENT.test.local |
Select-Object -ExpandProperty distinguishedname |
ForEach-Object { $_.substring($_.indexof('OU')) } | ForEach-Object {
Get-DomainObjectAcl -ResolveGUIDs $_.ObjectDN
} | Where-Object {
($_.ObjectAceType -like 'ms-Mcs-AdmPwd') -and
($_.ActiveDirectoryRights -match 'ReadProperty')
} | Select-Object -ExpandProperty SecurityIdentifier | Get-DomainObject
```