Pentest Notes
search
⌘Ctrlk
Pentest Notes
  • About
  • Notes
    • Methodologies & Tools
      • Scanning & Enumeration
      • Active Directory
      • Privilege Escalation
        • Windows
          • Basic Methodology
          • UAC Bypass
          • Privilege Exploits
          • Service Exploits
          • Password Hunting
          • Scheduled Tasks
          • Insecure File Permissions
          • Driver Kernel Exploits
          • LAPS Password
          • AlwaysInstallElevated
          • SMBGhost
          • PowerShell
          • PowerUp
          • Enable Remote Desktop
          • Cheatsheets
        • Linux
      • Web
      • Network Pivoting
      • Tools
      • File Transfer
      • External
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Noteschevron-right
  2. Methodologies & Toolschevron-right
  3. Privilege Escalationchevron-right
  4. Windows

LAPS Password

LogoCredential Dumping: LAPSHacking Articleschevron-right
LogoReleases · swisskyrepo/SharpLAPSGitHubchevron-right
LogoMalicious use of Microsoft LAPSAkijosberrychevron-right
PreviousDriver Kernel Exploitschevron-leftNextAlwaysInstallElevatedchevron-right

Last updated 3 years ago

$Computers = Get-ADComputer -Filter * -Properties ms-Mcs-AdmPwd, ms-Mcs-AdmPwdExpirationTime
$Computers | Sort-Object ms-Mcs-AdmPwdExpirationTime | Format-Table -AutoSize Name, DnsHostName, ms-Mcs-AdmPwd, ms-Mcs-AdmPwdExpirationTime