LAPS (Local Administrator Password Solution) Pentesting
LAPS provides management of local account passwords of domain joined computers. Passwords are stored in Active Directory.
Enumeration
Obtain Administrator's Password
First, check if you are in the LAPS_Readers group.
Using Get-ADComputer
Get-ADComputer gets the information of the Active Directory computer.
Using Get-LAPSPasswords.ps1
-
Download the Payload in Local Machine
If you are in LAPS_Readers, you can get the administrator's password using Get-LAPSPasswords.ps1{:target="_blank"}{:rel="noopener"}.
-
Transfer the Payload to Target Machine
-
via PowerShell
First off, open web server in local machine.
Then curl in target machine
-
via Evil-WinRM
If you connect the remote Windows machine with Evil-WinRM, you can use directly by adding -s flag when connecting.
Then just execute the payload in evil-winrm console.
-
-
Execute the Payload in Target Machine