Post-Exploiting a VMware vCenter Server

Write-up on how to post exploit a vSphere Server, as my experience at the time with it was limited and I needed to find myself some good information - hence this blog post. At the end, I briefly describe how to extract cached AD credentials, as it was possible during the pentest as well.