Edges
Working with the BloodHound API
This privilege allows a principal to read the LAPS password from a computer.
For systems using legacy LAPS, the following AD computer object properties are relevant:
- ms-Mcs-AdmPwd: The plaintext LAPS password
- ms-Mcs-AdmPwdExpirationTime: The LAPS password expiration time
For systems using Windows LAPS (2023 edition), the following AD computer object properties are relevant:
- msLAPS-Password: The plaintext LAPS password
- msLAPS-PasswordExpirationTime: The LAPS password expiration time
- msLAPS-EncryptedPassword: The encrypted LAPS password
- msLAPS-EncryptedPasswordHistory: The encrypted LAPS password history
- msLAPS-EncryptedDSRMPassword: The encrypted Directory Services Restore Mode (DSRM) password
- msLAPS-EncryptedDSRMPasswordHistory: The encrypted DSRM password history
Abuse Info
Plaintext attributes can be read using a simple LDAP client. For example, with PowerView:
On Linux, using bloodyAD:
Encrypted attributes can be decrypted using Microsoft’s LAPS PowerShell module. For example:
The encrypted attributes can also be retrieved and decrypted using lapsv2decrypt (dotnet or BOF).
Opsec Considerations
Reading properties from LDAP is extremely low risk, and can only be found using monitoring of LDAP queries.