ReadLAPSPassword
Last updated
Was this helpful?
Last updated
Was this helpful?
This abuse can be carried out when controlling an object that has GenericAll
or AllExtendedRights
(or combination of GetChanges
and (GetChangesInFilteredSet
or GetChangesAll
) for domain-wise synchronization) over the target computer configured for LAPS. The attacker can then read the LAPS password of the computer account (i.e. the password of the computer's local administrator).
Alternative #1: Using
Alternative #2: (Python)
Alternative #3: also has this ability. In case it doesn't work for CrackMapExec could also be used.
Impacket's ntlmrelayx also carries that feature, usable with the --dump-laps
.
Alternative #4: is another Python alternative.