For convenience, I’ll use proxychains in combination with the jump host, which is the Kali Linux machine, to run secretdump (note: in a real-world pentest scenario, this may vary). Using secretdump, I will extract the cached logon credentials from the target machine. Then, I’ll proceed to crack these password hashes using hashcat. And I will have a new user that is tpetty