Below you will find pages that utilize the taxonomy term “Evil-Winrm”
Hack The Box - Machines
read more
Administrator

Summary
- using
netexecto find we have PSRemote permissions on the box - run bloodhound via evil-winrm
- abuse
GenericAllpermissions on Michael - abuse
ForceChangePasswordon Benjamin - Find pwsafe vault in FTP
- crack the vault and find Emily’s password
- Abuse Targeted Kerberoasting to get Ethan’s hash
- Crack the hash of Ethan
- perform the DCSync Attack
USER
Initial Enumeration
This machine is a bit different from other HTB Machines. we receive some info at the beginning and start the box with a username and password. olivia / ichliebedich are the valid credentials we start with.
This looks like an Assume Breach Scenario. cool!