We have just explored how to escalate privileges within a system, and how to grab the credentials over the network. Now let's utilize all the details that we have collected so far. And then we should be able to achieve the goal of penetration testing using the kill-chain methodology. In this section, we will escalate the privilege of a normal domain user to that of the domain administrator.
We identify the system that is connected to the domain and utilize our Empire PowerShell tool to escalate to the domain controller and dump all the username and password hashes:
You can harvest more information about the domain using the get_domain_controller situational awareness module:
Usemodule situational_awareness/network/powerview/get_group_member
The second step is to invoke the wmi module from the Empire PowerShell tool. This will...