This privilege allows a principal to read the LAPS password from a computer.
For systems using legacy LAPS, the following AD computer object properties are relevant:
For systems using Windows LAPS (2023 edition), the following AD computer object properties are relevant:
Plaintext attributes can be read using a simple LDAP client. For example, with PowerView:
On Linux, using bloodyAD:
Encrypted attributes can be decrypted using Microsoft’s LAPS PowerShell module. For example:
The encrypted attributes can also be retrieved and decrypted using lapsv2decrypt (dotnet or BOF).
Reading properties from LDAP is extremely low risk, and can only be found using monitoring of LDAP queries.
This privilege allows a principal to read the LAPS password from a computer.
For systems using legacy LAPS, the following AD computer object properties are relevant:
For systems using Windows LAPS (2023 edition), the following AD computer object properties are relevant:
Plaintext attributes can be read using a simple LDAP client. For example, with PowerView:
On Linux, using bloodyAD:
Encrypted attributes can be decrypted using Microsoft’s LAPS PowerShell module. For example:
The encrypted attributes can also be retrieved and decrypted using lapsv2decrypt (dotnet or BOF).
Reading properties from LDAP is extremely low risk, and can only be found using monitoring of LDAP queries.