# Escalating Access

## Strategy

{% hint style="danger" %}
**ENUMERATE EVERYTHING AND SCREENSHOT ALL FINDINGS**
{% endhint %}

* Password Spray using [TREVORSpray](/external-pentest-playbook/attacking-login-portals/password-spraying-o365.md#trevorspray) or any similar tool
* After gaining a foothold search the emails for anything related to **VPNs** and **Passwords**
  * **SharePoint** is a great place to search of passwords in spreadsheets
  * Take screenshots of any sensitive information or files you have access to as evidence
* Log into **portal.azure.com** and dump out all of the user accounts on the Domain
  * The more accounts you have, the better possibility of a successful password spray&#x20;
  * Add a new user if the breached account has permissions to do so
* [Password Spray](/external-pentest-playbook/attacking-login-portals/password-spraying-o365.md) against all of the new accounts
* Figure out how they log into their VPN and connect to the network

Escalating access may turn into a cycle of breaching an account, enumerating it, try to get into the internal network through the account, breaching more accounts through the original ... and so on


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://pnpt.adot8.com/external-pentest-playbook/escalating-access.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
