SCCM lab tests
Summary of SCCM-Specific Tactics and Techniques
Scope
This document summarizes tactics and techniques associated with Microsoft Configuration Manager (SCCM / MECM / ConfigMgr), using the Synzack/ludus_sccm lab as the primary reference and Misconfiguration-Manager as the main source for taxonomy and tradecraft.
Its purpose is to support analysis in lab environments and authorized validation work, not to provide intrusion procedures for unauthorized systems.
Why ludus_sccm Is a Strong Reference
The ludus_sccm lab deploys a realistic SCCM architecture that is well suited for testing:
DC01with AD CS.sccm-sitesrvas the site server.sccm-mgmtas the management point.sccm-distroas the distribution point.sccm-sqlas a remote site database.Workstationas a managed client.- WebDAV enabled on the site server.
- PXE enabled.
- Network Access Account (NAA) configured.
- Client Push enabled with NTLM fallback.
- AD forest, system, user, and group discovery enabled.
That combination exposes multiple SCCM-specific attack surfaces and makes it possible to reproduce discovery, credential access, remote execution, NTLM relay, and hierarchy takeover scenarios.
Most Relevant SCCM Tactics
According to Misconfiguration-Manager, SCCM techniques cluster around these areas:
Initial Access: abuse of PXE and client-accessible policies.Credential Access: NAA, task sequence secrets, DPAPI-protected material, client push accounts, and AdminService credentials.Discovery: enumeration through LDAP, SMB, HTTP, SMS Provider, site systems, and client inventory.Execution: application deployment and script execution through SCCM.Lateral Movement: deployments, CMPivot, and NTLM relay through SCCM components.Privilege Escalation: relays to MSSQL, LDAP, AD CS, SMS Provider, or AdminService.Persistence: abuse of deployments and administrative rights in the hierarchy.
Technique Matrix
| Tactic | Technique | Primary Prerequisites | Likely Impact |
|---|---|---|---|
| Initial Access, Credential Access | CRED-1 - PXE Credentials | Network access to a PXE-enabled distribution point; PXE configured | Recovery of NAA or task sequence secrets; unauthenticated-to-domain foothold |
| Credential Access | CRED-2 - Policy Request Credentials | Computer account context or ability to add a machine to the domain; automatic approval behavior; accessible management point | Recovery of NAA, collection variable secrets, or task sequence credentials |
| Execution, Lateral Movement | EXEC-1 - Application Deployment | SCCM administrative role with application deployment capability | Remote command or binary execution as user or SYSTEM on managed clients |
| Execution, Lateral Movement | EXEC-2 - PowerShell Script Execution | SCCM role with script creation, approval, and execution rights | Remote PowerShell execution as SYSTEM on one or more clients |
| Discovery | RECON-5 - Locate Users via SMS Provider | Read access through SMS Provider or AdminService | Identification of admin workstations, primary devices, and recent user activity |
| Privilege Escalation, Lateral Movement | ELEVATE-2 - NTLM Relay via Automatic Client Push Installation | Automatic client push enabled; NTLM fallback enabled; reachable management point; relay path available | Compromise of client push credentials or site server identity |
| Privilege Escalation, Lateral Movement | TAKEOVER-1 - Relay to Site DB (MSSQL) | Remote site database; coercible SCCM system; relay path to MSSQL | SCCM Full Administrator assignment and hierarchy control |
| Privilege Escalation, Lateral Movement | TAKEOVER-3 - Relay to AD CS | AD CS web enrollment or related service reachable; coercible SCCM system; vulnerable enrollment flow | Certificate-based impersonation of SCCM systems and follow-on hierarchy abuse |
Key Techniques Observable in the Lab
1. CRED-1 - PXE Credentials
- Surface: distribution point with PXE enabled.
- Relevance in
ludus_sccm:ludus_sccm_enable_pxe: true. - Risk: an actor with network access may retrieve PXE boot material and extract secrets, including credentials embedded in policies or task sequences.
- Typical impact: transition from unauthenticated network access to reusable domain credentials.
2. CRED-2 - Policy Request Credentials
- Surface: management point and automatic client approval flow.
- Relevance in
ludus_sccm: NAA is configured and the lab models a complete SCCM client environment. - Risk: an authenticated SCCM client may request machine policy and recover obfuscated secrets, especially NAA credentials and credentials stored in task sequences or collection variables.
- Typical impact: escalation from a domain user or computer context into accounts with content access or higher privilege due to poor account scoping.
3. EXEC-1 - Application Deployment
- Surface: SCCM console, SMS Provider, or AdminService with deployment permissions.
- Relevance in the lab: the client workstation and hierarchy allow realistic validation of collection-based deployments.
- Risk: an operator with suitable SCCM rights may deploy binaries or commands to clients as the user context or
SYSTEM. - Typical impact: remote execution, lateral movement, and possible NTLM coercion through attacker-controlled UNC paths.
4. EXEC-2 - PowerShell Script Execution
- Surface: SCCM
Run Scriptcapability. - Relevance in the lab: the environment is suitable for testing administrative remote execution against managed clients.
- Risk: any principal with sufficient SCCM permissions may run remote PowerShell as
SYSTEM. - Typical impact: post-exploitation actions, persistence, collection, or tooling deployment.
5. RECON-5 - Locate Users via SMS Provider
- Surface: SMS Provider and inventory or user-device affinity data.
- Relevance in the lab: user, system, and affinity discovery are enabled in the base deployment.
- Risk: actors with read access can identify administrator workstations, recently logged-in users, and primary-device relationships.
- Typical impact: precise target selection for deployments, relay attempts, or lateral movement.
6. ELEVATE-2 - NTLM Relay via Automatic Client Push Installation
- Surface: automatic client push, NTLM fallback, and SMB or HTTP connectivity.
- Relevance in
ludus_sccm:ludus_sccm_configure_client_push: trueludus_sccm_enable_automatic_client_push_installation: trueludus_sccm_allow_NTLM_fallback: trueenable_webdavon the site server
- Risk: SCCM may authenticate automatically to attacker-controlled destinations during client push, enabling NTLM coercion and relay.
- Typical impact: compromise of client push accounts or the site server identity, with local or domain escalation depending on effective privileges.
7. TAKEOVER-1 - Relay to Site DB (MSSQL)
- Surface: remote SCCM site database on
sccm-sql. - Relevance in
ludus_sccm: SQL is separated from the site server, which is exactly the pattern that makes relay to MSSQL especially valuable. - Risk: if NTLM authentication is coerced from the site server or SMS Provider toward a relay server, that identity may be reused against the SCCM database where those systems often hold high privileges.
- Typical impact: assignment of the
Full Administratorrole in SCCM and control of the hierarchy.
8. TAKEOVER-3 - Relay to AD CS
- Surface: AD CS and certificate enrollment web services.
- Relevance in
ludus_sccm: the domain controller installs AD CS and the lab is designed for SCCM scenarios that may use PKI. - Risk: a coerced site-system identity may be relayed to AD CS to obtain a certificate usable for authentication as that system.
- Typical impact: takeover of SCCM components and follow-on escalation to
Full Administrator.
Especially Realistic Attack Chains in This Lab
Chain A - PXE to Reusable Secrets
- PXE exposed on the distribution point.
- Recovery of boot media or variable files.
- Extraction of NAA or task sequence credentials.
- Access to content, shares, or additional systems.
Chain B - Domain Client to SCCM Secrets
- Creation or control of a domain computer account.
- Registration or approval as an SCCM client.
- Request for machine policy.
- Recovery of NAA, collection variables, or deployment secrets.
Chain C - Client Push to NTLM Relay
- Registration of a target host to trigger client push.
- Authentication from the site server or client push account to an attacker-controlled server.
- SMB or HTTP relay to an internal target.
- Local or domain escalation depending on the relay target configuration.
Chain D - Relay to MSSQL and Hierarchy Takeover
- NTLM coercion from the site server or SMS Provider.
- Relay to
sccm-sql. - RBAC modification in the
CM_<SiteCode>database. - Addition of an attacker-controlled principal as
Full Administrator. - Follow-on use of
Application Deployment,Run Script, orCMPivotfor full operational control.
Chain E - Relay to AD CS
- Coercion from a site system.
- Relay to an AD CS enrollment web endpoint.
- Certificate issuance in the name of the coerced system.
- Authentication as that system and administrative abuse of SCCM.
Concrete Risk Indicators Present in ludus_sccm
- Configured NAA: increases the value of policies, PXE material, and task sequences.
- Automatic client push: expands coercion opportunities.
- NTLM fallback: makes relay more practical than in PKI- or Kerberos-only configurations.
- WebDAV or WebClient exposure: can enable more interesting HTTP-based coercion chains.
- AD CS in the domain: enables certificate abuse and ESC8-style scenarios if web enrollment is available and weakly protected.
- Remote SQL: favors relay-to-MSSQL takeover paths.
- Broad discovery: improves the quality of inventory available to operators with SCCM access.
Practical Prioritization for Testing
If the goal is to quickly assess exposure in this lab, the most useful order is usually:
- Validate
CRED-1andCRED-2to determine secret exposure. - Review
ELEVATE-2because of the client push + NTLM fallback + WebDAV combination. - Check whether
TAKEOVER-1is feasible when the SCCM database is remote. - Check whether
TAKEOVER-3is feasible if AD CS web enrollment is available. - With SCCM privileges, measure operational impact through
EXEC-1,EXEC-2, andRECON-5.
References
https://github.com/Synzack/ludus_sccmhttps://github.com/subat0mik/Misconfiguration-Managerhttps://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/CRED/CRED-1/cred-1_description.mdhttps://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/CRED/CRED-2/cred-2_description.mdhttps://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/EXEC/EXEC-1/exec-1_description.mdhttps://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/EXEC/EXEC-2/exec-2_description.mdhttps://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/RECON/RECON-5/recon-5_description.mdhttps://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/ELEVATE/ELEVATE-2/ELEVATE-2_description.mdhttps://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/TAKEOVER/TAKEOVER-1/takeover-1_description.mdhttps://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/TAKEOVER/TAKEOVER-3/takeover-3_description.md