Flow
Foothold to Client 1, privesc & create persistency (create user / ssh key)
Enum for Client 2 infomation and creds (e.g. from config files & logs & histories)
or the DB connection (with DB creds) could lead to Client 2 access (mssql xp_cmdshell)
When Client 1 is able to access Client 2 subnet, setup Proxychains in Client 1 to Client 2 subnet for kali's access to Client 2 subnet
or Proxychains in kali to Client 1 when it enabled SSH (with creds / ssh key placed)
Proxychains nmap
If it is DB connection, just tunnel the DB port (-L from kali / -R from client 2)
Kali access to Client 2 and privesc for dumping creds
may need upload and run a rev shell if access Client 2 thru DB
In Client 2, dump hash from SAM for local account creds, PtH for access if can't crack
Ensure persistency in Client 2 (e.g. having pwd / hash / new admin)
Look for Admin accounts
RDP if possible
May find also domain.loca\user accounts from SAM dumps
CME / PsExec PtH
In Client 2, enum for DC info & user, PsExec
Dump hash from LSASS for logged on user account creds, PtH if can't crack
Look for domain.local\admin creds
Enum SPN and kerberoast to access service account
Create silver / golden ticket with service hash & user account SID (if is domain admin)
Or token impersonation to access DC
Last updated