Graffiti : A Tool To Generate Obfuscated One Liners To Aid In Penetration Testing

SharpLAPS is a tool to Retrieve LAPS Password From LDAP.

The attribute ms-mcs-AdmPwd stores the clear-text LAPS password.

This executable is made to be executed within Cobalt Strike session using execute-assembly. It will retrieve the LAPS password from the Active Directory.

Require (either):

  • Account with ExtendedRight or Generic All Rights
  • Domain Admin privilege

Usage

_ _ _
/ // /_ _
/ / / | / _ \/ / _ \/ _ \/ _ `/ / _ \/ / / /| | / // /__ \
/ / / / / // / / / // / // _ |/ // /
/// //__,// / .
/// |// /
/
Required
/host:<1.1.1.1> LDAP host to target, most likely the DC
Optional
/user: Username of the account
/pass: Password of the account
/out: Outputting credentials to file
/ssl Enable SSL (LDAPS://)
Usage: SharpLAPS.exe /user:DOMAIN\User /pass:MyP@ssw0rd123! /host:192.168.1.1

Screenshot