- ms-Mcs-AdmPwd: The plaintext LAPS password
- ms-Mcs-AdmPwdExpirationTime: The LAPS password expiration time
- msLAPS-Password: The plaintext LAPS password
- msLAPS-PasswordExpirationTime: The LAPS password expiration time
- msLAPS-EncryptedPassword: The encrypted LAPS password
- msLAPS-EncryptedPasswordHistory: The encrypted LAPS password history
- msLAPS-EncryptedDSRMPassword: The encrypted Directory Services Restore Mode (DSRM) password
- msLAPS-EncryptedDSRMPasswordHistory: The encrypted DSRM password history
Abuse Info
Plaintext attributes can be read using a simple LDAP client. For example, with PowerView:Opsec Considerations
Reading properties from LDAP is extremely low risk, and can only be found using monitoring of LDAP queries.Edge Schema
Source: User, Group, ComputerDestination: Computer
Traversable: Yes
References
- https://www.specterops.io/assets/resources/an_ace_up_the_sleeve.pdf
- https://adsecurity.org/?p=3164
- https://learn.microsoft.com/en-us/powershell/module/laps/get-lapsadpassword
- https://github.com/xpn/RandomTSScripts/tree/master/lapsv2decrypt
- https://github.com/CravateRouge/bloodyAD
- https://specterops.io/blog/2018/08/07/bloodhound-2-0/