Summary
The video discusses various attacks targeting System Center Configuration Manager (SCCM) and provides insights into environment setups, attack vectors, and script deployment methods.
Key Points
- The presenter shares setup adjustments for a more customizable interface similar to a Linux environment.
- Installation issues related to SCCM and virtual machine setups are highlighted, along with troubleshooting tips.
- The presenter discusses various attack techniques related to SCCM, including reconnaissance, privilege escalation, and lateral movement.
- The importance of app deployment and script execution for compromising SCCM is emphasized.
- First attempts to create, approve, and execute scripts within SCCM are documented, including challenges faced with permission settings.
- Script deployment from MSSQL and the potential for hidden applications are explored, suggesting sophistication in managing SCCM environments.
- The video concludes with audience engagement, inviting questions and discussions about ongoing SCCM attack techniques and methodologies.
Youtube Video: https://www.youtube.com/watch?v=tj1D3YZEJIk
Youtube Channel: Lsecqt
Video Published: 2024-11-03T06:16:06+00:00