Hacks Weekly #2: Microsoft Local Admin Password Solution (LAPS) - Deployment Steps

Поділитися
Вставка
  • Опубліковано 4 жов 2024

КОМЕНТАРІ • 39

  • @danking7830
    @danking7830 7 років тому +6

    Great tutorial.
    At 12:00 the rights you are looking for are farther down the list, not the "All Extended Rights". There are 4 with the following naming convention: "ms-Mcs-AdmPwd*" . Those are the ones associated with the LAPS schema and where passwords are stored.

  • @BernardoAmorim
    @BernardoAmorim 6 років тому

    Ok so now I have to implement this across my company domain!!! Thanks Alot! Its a gresat video! You make these computers more human!!!

  • @aksfortech
    @aksfortech Рік тому

    Awesome Madam !

  • @jeliazkozlatev3940
    @jeliazkozlatev3940 2 роки тому +2

    i was wondering if you can make some series of videos on securing default windows installation i.e. best practices

  • @nadeemali79
    @nadeemali79 7 років тому +1

    interesting and excellent share

  • @tjokkerstar1462
    @tjokkerstar1462 7 років тому +8

    Why was helpdesk not checked in "All extended rights" if that is what makes them able to read?

    • @tomdrozdek4751
      @tomdrozdek4751 2 роки тому

      They needed to scroll down to see the checked items.

  • @jordangelino1387
    @jordangelino1387 6 років тому

    Great video! Thanks for sharing.

  • @larson123123
    @larson123123 7 років тому

    Yeah, good job. It's on the 70-744 exam.

  • @maninder1984
    @maninder1984 2 роки тому

    Thank you, very good information

  • @Blueraazor
    @Blueraazor 8 років тому +2

    Good job!

  • @virtualallocex1062
    @virtualallocex1062 5 років тому

    Very nice Video, thank you!

  • @vijayreddy804
    @vijayreddy804 7 років тому

    Very Helpful

  • @RichardDalrympleplus
    @RichardDalrympleplus Рік тому

    Were do you see logs?

  • @lijie6431
    @lijie6431 6 років тому +1

    Can you mitigate pass the hash exploit by disabling Ntlm?

  • @TheStevenWhiting
    @TheStevenWhiting 5 років тому

    I assume you need more permissions that domain admin to update the adschema? I had to just use psexec to run powershell as system so I could do the update.
    Schema Admins by any chance?

  • @double-you5130
    @double-you5130 7 років тому

    dzienkuje

  • @ukaszkoteluk8791
    @ukaszkoteluk8791 7 років тому

    Po zastosowaniu się do wszystkich kroków i wygenerowaniu nowego hasła, nadal obowiązuje stare hasło , z którego do tej pory korzystałem. Czyżbym nie do końca rozumiał idei tego narzędzia?

  • @waseemhacks707
    @waseemhacks707 5 років тому

    Full episode link please ?

  • @drunkenduck2
    @drunkenduck2 5 років тому

    I follwed the tut, but i dont can read a password. The dc is running in a vm. I am the Domain Administrator. No way to read password. Especially i cant See if my Configuration is working.

    • @CQUREAcademy
      @CQUREAcademy  5 років тому

      In this tutorial, we are extracting hashes, not passwords. However, if you have problems with extracting the hash from the SAM database, it may be caused by not having enough privileges. Please make sure you used psexec to elevate to the local system (as Paula is doing in the video) and then verify if it was successful with “whoami” command. Also please note that you need to run CQHashDumpv2 or Mimikatz from that very terminal window which is running under “nt authority\system”

  • @itai1984
    @itai1984 7 років тому

    Just wondering , in the real world each endpoint has at least AV and sometimes additional anti malware tools, is this tool is still effective besides the POC concepts shown here?

    • @Ruchikun
      @Ruchikun 7 років тому

      the tool can be customized and bypass any AV

  • @jstump1972
    @jstump1972 7 років тому

    Does the management side of LAPS have to be installed on a Domain Controller?

    • @double-you5130
      @double-you5130 7 років тому

      YES - that is how you get your admx and adml files in your loca policy store then you copy the admpwd.admx/l files to your adml/s policy store on your sysvol.

  • @arjunkashyap7360
    @arjunkashyap7360 5 років тому

    Why would I need a hash to get access of other system's local admin when the password of my machine and their machine is same because to perform the hack , i need admin privilege which i will only be having if i am having the password of that local admin.
    Please correct me if i am wrong or missing something.

  • @jstump1972
    @jstump1972 7 років тому

    how to separate permissions to view password on client computer versus servers, we would not want the desktop team folks to see servers local admin passwords.

    • @double-you5130
      @double-you5130 7 років тому

      you dont install the GUI on the clients - only on the server. so you can only look at passwords on server. since you will deploy this with GPO and the default for the msi package is client only. there ill be no issue.

  • @omegarev
    @omegarev 7 років тому

    Why doesn't mine change the password after I set a Date&Time for the password to expire?
    Please Help.

    • @lijie6431
      @lijie6431 6 років тому

      omegarev check gpresult /r if the policy got implemented.

  • @neeraj79
    @neeraj79 5 років тому +1

    Ur videos are awesome but not the volume.

  • @ErikCurtisPhotography
    @ErikCurtisPhotography 7 років тому

    is laps installed on each domain controller?

    • @lijie6431
      @lijie6431 6 років тому

      Erik Curtis should be just one. Then the setting gets replicated to others.