Forest Hackthebox — Walkthrough Best

If you are searching for the , you have come to the right place. We will cover enumeration, AS-REP roasting, cracking hashes, WinRM access, and finally abusing WriteOwner privileges to compromise the domain.

From BloodHound, we see that svc-alfresco has WriteOwner on Exchange Windows Permissions . Use PowerView (upload via WinRM) or net commands: forest hackthebox walkthrough best

whoami /all net user svc-alfresco We see the user belongs to Service Accounts and Privileged IT Accounts , but more importantly, we need to check group memberships recursively. Upload SharpHound.exe or use BloodHound.py from Kali: If you are searching for the , you

If you are searching for the , you have come to the right place. We will cover enumeration, AS-REP roasting, cracking hashes, WinRM access, and finally abusing WriteOwner privileges to compromise the domain.

From BloodHound, we see that svc-alfresco has WriteOwner on Exchange Windows Permissions . Use PowerView (upload via WinRM) or net commands:

whoami /all net user svc-alfresco We see the user belongs to Service Accounts and Privileged IT Accounts , but more importantly, we need to check group memberships recursively. Upload SharpHound.exe or use BloodHound.py from Kali: