cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Who rated this post

Let's see, once I am able to RDP login to a host which is part of the AD.  The opportunity is endless.  

 

I can start by following these steps which I just finish #2,

 

  1. Reconnaissance
  2. Initial intrusion into the network
  3. Establish a backdoor into the network
  4. Obtain user credentials
  5. Install various utilities
  6. Privilege escalation/ lateral movement/ data exfiltration
  7. Maintain persistence

Google "pass the hash" , "windows privilege escalation"   

 

or I just drop a ransomware on the file servers to lock all the user data , etc. etc...

Who rated this post