Intercept (Chain)
This is not a writeup, just my notes about the machine.

Credentials
Username
Password
Method
Scope
Information Gathering
Service Enumeration
10.10.202.53
DNS
SMB (enum4linux-ng)
Kerberos (Kerbrute)
10.10.202.54
SMB (Enum4linux-ng)
Compromising domain user
Finding a valid usernames
Crafting malicious files to capture NTLMv2 hashes
Uploading the files into dev folder
Capturing Kathryn.Spencer's NTLMv2 hash
Cracking
Discovering a exploitable LDAP misconfiguration
Discovering a WebClient Service available
Abusing NTLM Relay Attack
Running responder to generate Netbios
Adding our machine to the domain’s DNS records
Coercing Authentication
Abusing Resource Based Constrained Delegation
Requesting Ticket Granting Ticket using S4U
Dumping SAM database and LSA Secrets
Compromise Domain Controller

Adding simon.bowen to ca-managers domain group
Enabling SubCA Template
Adding officer on intercept-DC01-CA
Requesting Administrator certificate using Subject Alternative Name (SAN)
Approving administrator certificate
Retrieving Administrator certificate
Requesting Administrator's Ticket Granting Ticket
Performing DCSync Attack
Last updated