Escalating access rights in Active Directory
We have just explored how to escalate privileges within a system and how to grab the credentials over the network. Now let's utilize all the details that we have collected so far. And then we should be able to achieve the goal of penetration testing using the kill-chain methodology. In this section, we will escalate the privilege of a normal domain user to that of the domain administrator.
We identify the system that is connected to the domain and utilize our Empire PowerShell tool to escalate to the domain controller and dump all the username and password hashes:

You can harvest more information about the domain using the situational awareness module get_domain_controller
:
Usemodule situational_awareness/network/powerview/get_group_member

The second step is to invoke the wmi
module from the Empire PowerShell tool. This will invoke the domain controller to become an agent to the listener, as shown in the following screenshot:
use lateral_movement/invoke_wmi...