This Metasploit module enumerates files from target domain controllers and connects to them via SMB. It then looks for Group Policy Preference XML files containing local/domain user accounts and passwords and decrypts them using Microsofts public AES key. This Metasploit module has been tested successfully on a Win2k8 R2 Domain Controller.
d11f7ba768f710619958ad116091f7900847ba400cd0b93e774ee3e70480841d