module

Windows Gather Active Directory BitLocker Recovery

Disclosed
N/A
Created
2018-05-30

Description

This module will enumerate BitLocker recovery passwords in the default AD
directory. This module does require Domain Admin or other delegated privileges.

Author

Ben Campbell ben.campbell@mwrinfosecurity.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use post/windows/gather/enum_ad_bitlocker
msf post(enum_ad_bitlocker) > show actions
...actions...
msf post(enum_ad_bitlocker) > set ACTION < action-name >
msf post(enum_ad_bitlocker) > show options
...show and set options...
msf post(enum_ad_bitlocker) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.