Empire Post Exploitation – Unprivileged Agent to DA Walkthrough

Let's say you've successfully phished a client, and now have an Empire agent on a victim computer. Congratulations! Establishing an initial foothold on a network, with either a .hta link or an office macro (excellent write-up using this method by @enigma0x3), can be one of the hardest parts of pentesting, and most security practices are designed to …

Continue reading Empire Post Exploitation – Unprivileged Agent to DA Walkthrough