Now that we've successfully completed Task 6 — gaining valid credentials (username + password) for the domain user alfredo — we are no longer just passive observers. We now have real access to the network.
🛠️ What Comes Next?
With domain credentials in hand, our next phase shifts to Active Directory enumeration and exploitation.
Here’s how we’ll proceed:
Enumerating AD relationships (ldapdomaindump, bloodhound-python)
Escalating privileges using built-in trust paths (net rpc, winPEAS).