Hacks Weekly #2: Microsoft Local Admin Password Solution (LAPS) - Deployment Steps

Поделиться
HTML-код
  • Опубликовано: 27 окт 2024

Комментарии • 39

  • @danking7830
    @danking7830 7 лет назад +6

    Great tutorial.
    At 12:00 the rights you are looking for are farther down the list, not the "All Extended Rights". There are 4 with the following naming convention: "ms-Mcs-AdmPwd*" . Those are the ones associated with the LAPS schema and where passwords are stored.

  • @aksfortech
    @aksfortech Год назад

    Awesome Madam !

  • @BernardoAmorim
    @BernardoAmorim 6 лет назад

    Ok so now I have to implement this across my company domain!!! Thanks Alot! Its a gresat video! You make these computers more human!!!

  • @jeliazkozlatev3940
    @jeliazkozlatev3940 2 года назад +2

    i was wondering if you can make some series of videos on securing default windows installation i.e. best practices

  • @tjokkerstar1462
    @tjokkerstar1462 7 лет назад +8

    Why was helpdesk not checked in "All extended rights" if that is what makes them able to read?

    • @tomdrozdek4751
      @tomdrozdek4751 3 года назад

      They needed to scroll down to see the checked items.

  • @nadeemali79
    @nadeemali79 7 лет назад +1

    interesting and excellent share

  • @maninder1984
    @maninder1984 2 года назад

    Thank you, very good information

  • @larson123123
    @larson123123 7 лет назад

    Yeah, good job. It's on the 70-744 exam.

  • @TheStevenWhiting
    @TheStevenWhiting 6 лет назад

    I assume you need more permissions that domain admin to update the adschema? I had to just use psexec to run powershell as system so I could do the update.
    Schema Admins by any chance?

  • @Blueraazor
    @Blueraazor 8 лет назад +2

    Good job!

  • @RichardDalrympleplus
    @RichardDalrympleplus 2 года назад

    Were do you see logs?

  • @virtualallocex1062
    @virtualallocex1062 5 лет назад

    Very nice Video, thank you!

  • @ukaszkoteluk8791
    @ukaszkoteluk8791 7 лет назад

    Po zastosowaniu się do wszystkich kroków i wygenerowaniu nowego hasła, nadal obowiązuje stare hasło , z którego do tej pory korzystałem. Czyżbym nie do końca rozumiał idei tego narzędzia?

  • @jordangelino1387
    @jordangelino1387 7 лет назад

    Great video! Thanks for sharing.

  • @lijie6431
    @lijie6431 6 лет назад +1

    Can you mitigate pass the hash exploit by disabling Ntlm?

  • @vijayreddy804
    @vijayreddy804 7 лет назад

    Very Helpful

  • @waseemhacks707
    @waseemhacks707 5 лет назад

    Full episode link please ?

  • @itai1984
    @itai1984 7 лет назад

    Just wondering , in the real world each endpoint has at least AV and sometimes additional anti malware tools, is this tool is still effective besides the POC concepts shown here?

    • @Ruchikun
      @Ruchikun 7 лет назад

      the tool can be customized and bypass any AV

  • @arjunkashyap7360
    @arjunkashyap7360 5 лет назад

    Why would I need a hash to get access of other system's local admin when the password of my machine and their machine is same because to perform the hack , i need admin privilege which i will only be having if i am having the password of that local admin.
    Please correct me if i am wrong or missing something.

  • @drunkenduck2
    @drunkenduck2 5 лет назад

    I follwed the tut, but i dont can read a password. The dc is running in a vm. I am the Domain Administrator. No way to read password. Especially i cant See if my Configuration is working.

    • @CQUREAcademy
      @CQUREAcademy  5 лет назад

      In this tutorial, we are extracting hashes, not passwords. However, if you have problems with extracting the hash from the SAM database, it may be caused by not having enough privileges. Please make sure you used psexec to elevate to the local system (as Paula is doing in the video) and then verify if it was successful with “whoami” command. Also please note that you need to run CQHashDumpv2 or Mimikatz from that very terminal window which is running under “nt authority\system”

  • @double-you5130
    @double-you5130 7 лет назад

    dzienkuje

  • @jstump1972
    @jstump1972 7 лет назад

    Does the management side of LAPS have to be installed on a Domain Controller?

    • @double-you5130
      @double-you5130 7 лет назад

      YES - that is how you get your admx and adml files in your loca policy store then you copy the admpwd.admx/l files to your adml/s policy store on your sysvol.

  • @omegarev
    @omegarev 7 лет назад

    Why doesn't mine change the password after I set a Date&Time for the password to expire?
    Please Help.

    • @lijie6431
      @lijie6431 6 лет назад

      omegarev check gpresult /r if the policy got implemented.

  • @jstump1972
    @jstump1972 7 лет назад

    how to separate permissions to view password on client computer versus servers, we would not want the desktop team folks to see servers local admin passwords.

    • @double-you5130
      @double-you5130 7 лет назад

      you dont install the GUI on the clients - only on the server. so you can only look at passwords on server. since you will deploy this with GPO and the default for the msi package is client only. there ill be no issue.

  • @ErikCurtisPhotography
    @ErikCurtisPhotography 7 лет назад

    is laps installed on each domain controller?

    • @lijie6431
      @lijie6431 6 лет назад

      Erik Curtis should be just one. Then the setting gets replicated to others.

  • @neeraj79
    @neeraj79 5 лет назад +1

    Ur videos are awesome but not the volume.