LAPS Dumper
Tool that dumps LAPS passwords. Dumps every LAPS password the account has the ability to read with a domain.
Description
lapsdumper is a specialized tool designed to extract Local Administrator Password Solution (LAPS) passwords from Active Directory environments. LAPS is a Microsoft feature that manages unique local administrator passwords for domain-joined computers, storing them securely in Active Directory attributes.
The tool authenticates to LDAP using provided credentials and queries for LAPS passwords that the authenticated account has permission to access. It is particularly useful in penetration testing and red team operations where domain credentials have been obtained and LAPS passwords need to be recovered for lateral movement to workstations and servers.
By connecting to the domain's LDAP server, lapsdumper retrieves the encrypted password attributes (ms-Mcs-AdmPwd) for specified computers or all accessible ones, enabling attackers to gain administrative access to target systems.
How It Works
lapsdumper uses python3-ldap3 to establish an LDAP connection to the specified domain controller or LDAP server. It authenticates with the provided username and password (or LM:NT hash), then queries Active Directory for LAPS password attributes (ms-Mcs-AdmPwd) on computer objects. The tool enumerates all computer accounts the authenticated user has read permissions for, decrypting and extracting the LAPS passwords stored in these attributes.
Installation
sudo apt install lapsdumperFlags
Examples
lapsdumper -u 'DOMAIN\user' -p 'Password123' -d 'corp.local'lapsdumper -u 'user' -p 'P@ssw0rd' -l 'dc01.corp.local' -d 'corp.local'lapsdumper -u 'svc_account' -p 'aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0' -d 'example.com'lapsdumper -u 'admin' -p 'Summer2026!' -d 'contoso.com' -c 'WORKSTATION01'lapsdumper -u 'jdoe' -p 'Password1' -d 'testlab.local' -o laps_passwords.txtlapsdumper -u 'DOMAIN\krbtgt' -p 'compromised_hash' -l '10.10.10.10' -d 'domain.local'