Skip to content

Commit ca732b8

Browse files
committed
More info to LAPS
1 parent 02824cd commit ca732b8

File tree

2 files changed

+7
-0
lines changed

2 files changed

+7
-0
lines changed

Resources/Tools.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,6 +129,7 @@ If data cannot be found in those files, one might try to go back one folder to `
129129
- [Mimikatz in python](https://github.com/skelsec/pypykatz)
130130
- [mRemoteNG Decryptor](https://github.com/kmahyyg/mremoteng-decrypt)
131131
- [bloodyAD](https://github.com/CravateRouge/bloodyAD)
132+
- [crackmapexec](https://github.com/byt3bl33d3r/CrackMapExec)
132133

133134
# Reverse Engineering
134135

Windows Hardening/Active Directory/LAPS.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,13 @@
1+
# Overview
12
**LAPS** allows you to manage the local **Administrator** password (which is randomised, unique, and changed regularly) on domain-joined computers. These passwords are centrally stored in Active Directory and restricted to authorised users using ACLs. Passwords are protected in transit from the client to the server using Kerberos v5 and AES.
23

34
When using LAPS, 2 new attributes appear in the computer objects of the domain: `ms-mcs-AdmPwd` and `ms-mcs-AdmPwdExpirationTime`. These attributes contains the plain-text admin password and the expiration time. Then, in a domain environment, it could be interesting to check which users can read these attributes.
45

6+
## Tools
7+
- [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1)
8+
- [crackmapexec](https://github.com/byt3bl33d3r/CrackMapExec)
9+
10+
511
# Check If Activated
612
```powershell
713
reg query "HKLM\Software\Policies\Microsoft Services\AdmPwd" /v AdmPwdEnabled

0 commit comments

Comments
 (0)