This document describes a penetration test where the attacker was able to execute commands on users' machines by exploiting an Excel export vulnerability in a web application. The attacker was able to retrieve NTLM hashes from low-level users and crack the hashes to obtain domain credentials. The attacker then explored ways to improve the attack by bypassing warnings in Excel and identifying alternative commands besides CMD.exe that could be executed without warnings.