MITRE ATT&CK TTPs
- T1187 - Forced Authentication
Requirements
- Run CMPivot permission on the Collection
- Read permission on Inventory Reports
- Read permissions on Devices and Collections.
Summary
CMPivot queries can be used to coerce SMB authentication from SCCM client hosts A user with CMPivot query execution permissions can trigger a query pointing to a UNC path. This will coerce the SYSTEM account of the query target to authenticate against the resource at the UNC path. SMB authentication can be relayed to a CA in the environment. If a vulnerable template exists then a certificate that allows for authentication can be obtained.Impact
This technique allows for taking over a machine object and privilege escalation within Active Directory environments.Defensive IDs
Some recommendations: Disable NTLM where possible Enforce Extended Protection for Authentication (EPA) along with SMB and LDAP signing. Prioritize Kerberos authentication and harden services like ADCS and IIS to block common relay paths.Examples
CMPivot Coerce
Setup a listening relay server such as ntlmrelayx:References
- Microsoft, [Changes to CMPivot - ConfigurationManager] (https://learn.microsoft.com/en-us/intune/configmgr/core/servers/manage/cmpivot-changes)
- Chris Thompson, [Coercing NTLM Authentication from SCCM] (https://posts.specterops.io/coercing-ntlm-authentication-from-sccm-e6e23ea8260a)
- Chris Thompson, [Relaying NTLM Authentication from SCCM client] (https://posts.specterops.io/relaying-ntlm-authentication-from-sccm-clients-7dccb8f92867)