Summary
In this chapter, we have learned very advanced topics that red-team members generally perform to compromise internal AD and Swift operations, including the Swift SQL DB. Hence, it is very important to understand an attacker’s approach if any machine in an internal network is compromised by a remote attacker. This chapter covered SMB brute-force, relays to compromise the NTLM hash, and SQL server misconfiguration through user impersonation and xp_cmdshell
.
The next chapter will focus on Voice Over IP (VOIP) attacks, including various techniques to compromise VOIP servers and VOIP networks, and MITM.