Overwatch
HackTheBox Overwatch machine writeup — reconnaissance and enumeration walkthrough.
Overwatch
Domain: overwatch.htb
Target IP: 10.129.13.226
Attacker IP: 10.10.14.159
Initial Situation
The target exposes a full Active Directory footprint alongside MSSQL and WinRM.
This immediately frames the machine as an enterprise host, not a standalone server.
In such environments, exploitation rarely comes from a single vulnerability - instead, it emerges from trust relationships between services.
The objective is to locate those trust boundaries and force them to work against the system.
Phase 1 - Mapping the Attack Surface
A full TCP scan is performed to understand how the host is positioned within the domain.
1
nmap -sC -sV -p- 10.129.13.226
Premium Content
The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.
Unlock Full Writeup → This post is licensed under CC BY 4.0 by the author.