Last updated
Last updated
We can discover which principals are allowed to read the ms-Mcs-AdmPwd attribute by reading its DACL on each computer object.
Dedicated tooling such as the also exist. Find-LAPSDelegatedGroups
will query each OU and find domain groups that have delegated read access.
Find-AdmPwdExtendedRights
goes a little deeper and queries each individual computer for users that have "All Extended Rights". This will reveal any users that can read the attribute without having had it specifically delegated to them.
To get a computer's password, simply read the attribute.
The make_token
command is an easy way to leverage it.