Pentester's Promiscuous Notebook
Twitter
GitHub
Blog
Sponsor
Search
⌃
K
Links
README
⚒️ Pentest
C2
Infrastructure
AD
ACL Abuse
AD CS Abuse
ADIDNS Abuse
Attack Trusts
Attack RODCs
AV / EDR Evasion
Authentication Coercion
Credentials Harvesting
Discovery
DnsAdmins
Dominance
GPO Abuse
Kerberos
Key Credentials Abuse
LAPS
Lateral Movement
LDAP
NTLM
Password Spraying
Post Exploitation
Pre-created Computers Abuse
PrivExchange
Privileges Abuse
RID Cycling
SCCM / MECM Abuse
SMB
RPC
Token Manipulation
User Hunt
WSUS
Zerologon
DevOps
DBMS
Authentication Brute Force
File Transfer
IPMI
Kiosk Breakout
Low-Hanging Fruits
LPE
Networks
NFS
Persistence
Pivoting
Post Exploitation
SNMP
SSH
TFTP
VNC
Misc
OSINT
Password Brute Force
Perimeter
Shells
Web
Wi-Fi
⚔️ Red Team
Basics
Cobalt Strike
Infrastructure
Malware Development
SE
⚙️ Admin
Git
Linux
Networking
Virtualization
Windows
Powered By
GitBook
Comment on page
SCCM / MECM Abuse
System Center Configuration Manager / Microsoft Endpoint Configuration Manager
https://posts.specterops.io/coercing-ntlm-authentication-from-sccm-e6e23ea8260a
https://www.hub.trimarcsecurity.com/post/push-comes-to-shove-exploring-the-attack-surface-of-sccm-client-push-accounts
https://blog.xpnsec.com/unobfuscating-network-access-accounts/
https://www.thehacker.recipes/ad/movement/sccm-mecm
https://www.securesystems.de/blog/active-directory-spotlight-attacking-the-microsoft-configuration-manager/
https://http418infosec.com/offensive-sccm-summary
Tools
MalSCCM
https://labs.nettitude.com/blog/introducing-malsccm/
https://github.com/nettitude/MalSCCM
SharpSCCM
https://github.com/Mayyhem/SharpSCCM
Last modified
2mo ago