A VDI Adventure – From Home-Worker to Server Admin

Context

During a five-day red-team for “MegaCorp”, we assessed a Citrix VDI used for smart-working. Goal: exfiltrate data from the internal network despite heavy lockdown policies.

Key Attack Path

Phase Highlight
Foothold Limited clipboard + transfer features; copy/paste disabled → abused IBM Cloud & ZeroBin to bypass proxy categories.
Exfiltration Built DNS-over-AES script to stream payloads via TXT records.
Sandbox Escape Leveraged Office VBA macros and FTP interactive console to spawn commands; abused rundll32 to run custom-code command line tool when cmd.exe was blocked.
Privilege Escalation Dumped Groups.xml / Drives.xml, cracked cpassword, reused local Admin on five hosts, including a DC.

Impact