You recall that with AD credentials, you can use if the user is in the right group. But svc-alfresco is not. You check group membership using net rpc or ldapsearch :
net user hacker Hacker123! /add /domain net group "Domain Admins" hacker /add /domain Then you use evil-winrm again with the new user: forest hackthebox walkthrough
ldapsearch -H ldap://10.10.10.161 -x -b "DC=htb,DC=local" The output is a firehose of objects—users, groups, computers. You grep for cn=users and find something delicious: . You filter for userAccountControl values that don’t require Kerberos pre-authentication. You recall that with AD credentials, you can
$krb5asrep$svc-alfresco@htb.local:... Bingo. No pre-auth required. You copy the hash to a file and feed it to john : /add /domain net group "Domain Admins" hacker /add
Target IP: 10.10.10.161 Your Machine: 10.10.14.x Phase 1: The Lay of the Land You fire up nmap like a cartographer charting unknown territory. The scan breathes life into the silent IP.
No SMB anonymous login. No null session on LDAP… yet. But Kerberos is a talkative protocol. You note the hostname: FOREST.htb.local . You add the domain to your /etc/hosts :