Pentests in restricted VDI environments

By |21 May. 2018|

A common scenario during an assessment or a pentesting is starting it from a VDI environment, focused towards "what could an insider or an attacker who has stolen a worker's credentials do". This type of environments usually have certain restrictions (major or minor) that hinder the first stages of the pentest. In this article we will discuss several methods followed in one of our latest pentests where we encountered the scenario described earlier, and additionally a small tool will be released to ease the transfer and exfiltration of files between the remote desktop and a local machine. 0x01 – Get a shell at VDI environment A starting point would be to get a terminal from which execute commands within the ...