SharpLAPS is a tool to Retrieve LAPS Password From LDAP.
The attribute ms-mcs-AdmPwd stores the clear-text LAPS password.
This executable is made to be executed within Cobalt Strike session using execute-assembly
. It will retrieve the LAPS password from the Active Directory.
Require (either):
ExtendedRight
or Generic All Rights
Usage
_ _ _
/ // /_ _ / / / | / _ \/ / _ \/ _ \/ _ `/ / _ \/ / / /| | / // /__ \
/ / / / / // / / / // / // _ |/ // /
/// //__,// / ./// |// //
Required
/host:<1.1.1.1> LDAP host to target, most likely the DC
Optional
/user: Username of the account
/pass: Password of the account
/out: Outputting credentials to file
/ssl Enable SSL (LDAPS://)
Usage: SharpLAPS.exe /user:DOMAIN\User /pass:MyP@ssw0rd123! /host:192.168.1.1
Screenshot
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…