sccm-exploitation
OfficialExploit SCCM for domain dominance.
Software Engineering#privilege escalation#lateral movement#credential harvesting#active directory#sccm#mecm
Authorblacklanternsecurity
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps penetration testers identify and exploit vulnerabilities within Microsoft SCCM/MECM infrastructure to gain credentials, move laterally, and escalate privileges within a target domain.
Core Features & Use Cases
- SCCM Enumeration: Discover SCCM site servers, management points, and client configurations.
- Credential Harvesting: Extract Network Access Account (NAA) credentials, PXE boot secrets, and database credentials.
- Lateral Movement & Escalation: Utilize management point relay, client push account relay, and application deployment for advanced attacks.
- Use Case: After discovering an SCCM server, use this Skill to harvest the Network Access Account credentials, which are often used for automated tasks, and then leverage those credentials to deploy a malicious payload to all domain-joined machines.
Quick Start
Use the sccm-exploitation skill to enumerate SCCM infrastructure in the domain.
Dependency Matrix
Required Modules
sccmhunterSharpSCCMMalSCCMntlmrelayxPetitPotampxethiefyCMLootMimikatzSQLRecon
Components
scriptsreferences
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: sccm-exploitation Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#sccm-exploitation Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.