Hacking SCCM by deploying POWERSHELL scripts!



SCCM Attacks Explained

Summary

The video discusses various attacks targeting System Center Configuration Manager (SCCM) and provides insights into environment setups, attack vectors, and script deployment methods.

Key Points

  • The presenter shares setup adjustments for a more customizable interface similar to a Linux environment.
  • Installation issues related to SCCM and virtual machine setups are highlighted, along with troubleshooting tips.
  • The presenter discusses various attack techniques related to SCCM, including reconnaissance, privilege escalation, and lateral movement.
  • The importance of app deployment and script execution for compromising SCCM is emphasized.
  • First attempts to create, approve, and execute scripts within SCCM are documented, including challenges faced with permission settings.
  • Script deployment from MSSQL and the potential for hidden applications are explored, suggesting sophistication in managing SCCM environments.
  • The video concludes with audience engagement, inviting questions and discussions about ongoing SCCM attack techniques and methodologies.

Youtube Video: https://www.youtube.com/watch?v=tj1D3YZEJIk
Youtube Channel: Lsecqt
Video Published: 2024-11-03T06:16:06+00:00