Defeating LAPS

CrackMapExec vs LAPS

Using CrackMapExec when LAPS installed on the domain

If LAPS is used inside the domain, is can be hard to use CrackMapExec to execute a command on every computer on the domain.
Therefore, a new core option has been added --laps ! If you have compromised an accout that can read LAPS password you can use CrackMapExec like this
crackmapexec winrm <ip> -u user-can-read-laps -p pass --laps
If the default administrator name is not administrator add the user after the option
--laps name