lsadump::zerologon detects and exploits the ZeroLogon vulnerability. It has the following command line arguments:
/account: the target DC SamAccountName
/target: the target DC FQDN
/exploit: proceed with exploitation
/null: null session authentication
/ntlm: use NTLM authentication
/type: The Secure Channel Types. The available values are:
Null
MsvAp
Workstation
TrustedDnsDomain
TrustedDomainUasServer
Server
CdcServer
This technique can break the domain's replication services hence leading to massive disruption, running the following "password change" technique is not advised.