A VDI Adventure – From Home-Worker to Server Admin
Context
During a five-day red-team for “MegaCorp”, we assessed a Citrix VDI used for smart-working. Goal: exfiltrate data from the internal network despite heavy lockdown policies.
Key Attack Path
| Phase | Highlight |
|---|---|
| Foothold | Limited clipboard + transfer features; copy/paste disabled → abused IBM Cloud & ZeroBin to bypass proxy categories. |
| Exfiltration | Built DNS-over-AES script to stream payloads via TXT records. |
| Sandbox Escape | Leveraged Office VBA macros and FTP interactive console to spawn commands; abused rundll32 to run custom-code command line tool when cmd.exe was blocked. |
| Privilege Escalation | Dumped Groups.xml / Drives.xml, cracked cpassword, reused local Admin on five hosts, including a DC. |
Impact
- Full domain-admin in ≤ 1 day.
- Demonstrated data exfiltration routes that bypassed DLP / SSL inspection.