sccm-exploitation

Official

Exploit SCCM for domain dominance.

Authorblacklanternsecurity
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps penetration testers identify and exploit vulnerabilities within Microsoft SCCM/MECM infrastructure to gain credentials, move laterally, and escalate privileges within a target domain.

Core Features & Use Cases

  • SCCM Enumeration: Discover SCCM site servers, management points, and client configurations.
  • Credential Harvesting: Extract Network Access Account (NAA) credentials, PXE boot secrets, and database credentials.
  • Lateral Movement & Escalation: Utilize management point relay, client push account relay, and application deployment for advanced attacks.
  • Use Case: After discovering an SCCM server, use this Skill to harvest the Network Access Account credentials, which are often used for automated tasks, and then leverage those credentials to deploy a malicious payload to all domain-joined machines.

Quick Start

Use the sccm-exploitation skill to enumerate SCCM infrastructure in the domain.

Dependency Matrix

Required Modules

sccmhunterSharpSCCMMalSCCMntlmrelayxPetitPotampxethiefyCMLootMimikatzSQLRecon

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: sccm-exploitation
Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#sccm-exploitation

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.