ReadLAPSPassword
This abuse can be carried out when controlling an object that has GenericAll
or AllExtendedRights
(or combination of GetChanges
and (GetChangesInFilteredSet
or GetChangesAll
) for domain-wise synchronization) over the target computer configured for LAPS. The attacker can then read the LAPS password of the computer account (i.e. the password of the computer's local administrator).
Alternative #1: Using bloodyAD
Alternative #2: pyLAPS (Python)
Alternative #3: NetExec also has this ability. In case it doesn't work this public module for CrackMapExec could also be used.
Impacket's ntlmrelayx also carries that feature, usable with the --dump-laps
.
Alternative #4: LAPSDumper is another Python alternative.
Last updated