byt3bl33d3r / CrackMapExec

A swiss army knife for pentesting networks
BSD 2-Clause "Simplified" License
8.37k stars 1.64k forks source link

CME to explain LAPS exploit #591

Closed abid28june closed 2 years ago

abid28june commented 2 years ago

can anyone explain how LAPS is begin abused/exploited by CME technically ?? and what if we get list of the passwords stored in LAPS, i believe the password we get as a result of CME execution is the reset password ?? also plz explain how to pass those extracted credentials to cme for further penetration?

mpgn commented 2 years ago

You can read a bit more here : https://mpgn.gitbook.io/crackmapexec/smb-protocol/defeating-laps