Post

Overwatch

HackTheBox Overwatch machine writeup — reconnaissance and enumeration walkthrough.

Overwatch

Domain: overwatch.htb
Target IP: 10.129.13.226
Attacker IP: 10.10.14.159


Initial Situation

The target exposes a full Active Directory footprint alongside MSSQL and WinRM.
This immediately frames the machine as an enterprise host, not a standalone server.
In such environments, exploitation rarely comes from a single vulnerability - instead, it emerges from trust relationships between services.

The objective is to locate those trust boundaries and force them to work against the system.


Phase 1 - Mapping the Attack Surface

A full TCP scan is performed to understand how the host is positioned within the domain.

1
nmap -sC -sV -p- 10.129.13.226

🔒

Premium Content

The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.

Unlock Full Writeup →
This post is licensed under CC BY 4.0 by the author.