MITRE ATT&CK Tactics
Requirements
- Local network access
- Line of sight to PXE-enabled distribution point
- PKI client authentication certificates are used for communication with the PXE-enabled distribution point
Optional Requirement
- Line of sight to a DHCP server (required if a distribution point hasn’t been previously discovered)
Summary
SCCM sites may optionally be configured to support public-key infrastructure (PKI) certificates for secure communications. For deployments with internet-based site systems, PKI certificates are required. When deployed, the distribution point (DP) role requires it’s PKI certificate to support client authentication and for the private key to be exportable. The certificate is used by the DP to support communication with HTTPS enabled management points. For PXE-enabled distribution points, the certificate is sent to and used by client computers to authenticate to management points during operating system deployment. For environments that leverage Microsoft’s PKI solution Active Directory Certificate Services (AD CS), the certificate generated for the DP role may be used to authenticate as the DP’s host AD machine account. An attacker who is able to successfully spoof PXE boot deployment and extract the PKI certificate from the PXE boot variables file contents may gain control of the certificate’s AD identity.Impact
The impact of recovery is environment dependent. At a minimuim, based on Microsoft’s documentation an attacker that recovers this certificate can impersonate a DP’s AD identity and compromise the host system.Defensive IDs
- DETECT-7: Monitor read access to the SMSTemp directory
- PREVENT-6: Configure a strong PXE boot password
- PREVENT-21: Restrict PXE boot to authorized VLANs
Examples
- On the attacker server, spoof the PXE boot process with pxethief.py with option 2 to recover the PKI certificate distributed by the targeted DP. A suitable Distribution Point can be identified using RECON-2. Otherwise, a PXE boot server may be discovered via a PXE DHCP discover broadcast using pxethief’s option 1.
- Inspect the certificate with openssl to confirm it’s an AD CS certificate and contains the client authentication EKU
- Use certipy to authenticate on behalf of the recovered certificate’s identity.
References
- Christopher Panayi, pxethief
- Christopher Panayi, Identifying and retrieving credentials from SCCM/MECM Task Sequences
- CRED-1, Retrieve secrets from PXE boot media
- Microsoft, PKI certificate requirements for Configuration Manager
- onSec-fr, Got pfx from server with client auth