LAPSToolkit Cheatsheet
PowerShell tool for enumerating and abusing Microsoft LAPS (Local Administrator Password Solution) in Active Directory environments.
Loading LAPSToolkit
Import-Module .\LAPSToolkit.ps1
Find Delegated Groups
Parse ExtendedRights for all computers with LAPS enabled. Shows groups specifically delegated to read LAPS passwords:
Find-LAPSDelegatedGroups
Find Extended Rights
Check rights on each LAPS-enabled computer for groups with read access and users with βAll Extended Rights.β Users with this right can read LAPS passwords and may be less protected than users in delegated groups:
Find-AdmPwdExtendedRights
Get LAPS Computers and Passwords
Search for LAPS-enabled computers, password expiration, and cleartext passwords (if your user has read access):
Get-LAPSComputers
Enumeration Flow
Find-LAPSDelegatedGroupsβ identify which groups can read LAPS passwords per OUFind-AdmPwdExtendedRightsβ find users/groups with extended rights on LAPS-enabled computersGet-LAPSComputersβ attempt to read actual passwords and expiration dates
Notes
- An account that has joined a computer to the domain receives All Extended Rights over that host, which includes the ability to read LAPS passwords
- Machines without LAPS installed are potential lateral movement targets (local admin password reuse)
- LAPS passwords are stored in the
ms-Mcs-AdmPwdattribute on computer objects in AD