Skip to main content

MITRE ATT&CK TTPs

Requirements

  • Valid Active Directory domain credentials

Summary

When a primary site server is installed, an entry of “SOFTWARE\Microsoft\SMS” is created in the “Computer Config -> Security Settings -> Local Policies -> Security Options -> Network Access: Remotely Accessible Registry Paths and Sub-Paths” in local group policy. On systems hosting the distribution point role, “SOFTWARE\Microsoft\SMS\DP” is exposed by the remote registry service. This security setting determines which registry paths and sub-paths can be accessed over the network, regardless of the users or groups listed in the access control list (ACL) of the winreg registry key. This registry key and sub keys contain information about the current site server and other site servers within the hierarchy. Enumerating this registry key and sub keys on a primary site server and distribution point contributes to attack path discovery.

Impact

  1. Profiling site system roles is a supplementary step in building potential attack paths
  2. A resolved DP role can be a target for PXE abuse to recover domain credentials detailed in CRED-1
  3. A resolved DP role can be a target for sensitive information hunting in the Content Library
  4. A resolved MP role can be a target for spoofing client enrollment CRED-2
  5. A resolved MP site system role can be used to elevate privileges via credential relay attacks ELEVATE-1
  6. A resolved Site Database role can be a target for lateral movement or privilege escalation detailed in TAKEOVER-1

Defensive IDs

Examples

Use pssrecon to enumerate a primary site server or distribution point over winreg. Primary Site Server:
pssrecon -u lowpriv -p password -d corp.local -host pss.corp.local

[+] Distrubution Point Installed
[+] Site Code Found: COR
[+] Site Server Found: SCCM.corp.local
[+] Management Point Found: http://SCCM.corp.local
[+] Management Point Found: http://SCCMMP.corp.local
[+] Management Point Installed
[+] Site Database Found: SCCMDB01.CORP.LOCAL
Distribution Point:
pssrecon -u lowpriv -p password -d corp.local -host dp.corp.local

[+] Distrubution Point Installed
[+] Site Code Found: COR
[+] Site Server Found: SCCM.CORP.local
[+] Management Point Found: http://SCCM.corp.local
[+] Management Point Found: http://SCCMMP.corp.local
[+] Anonymous Access On This Distrubution Point Is Enabled
[+] PXE Installed
Use Get-SiteServerCurrentUser.ps1 to enumerate the currently logged on user on a site server (very likely to be an SCCM admin).
Get-SiteServerCurrentUser -ComputerName cas-pss

Values in SOFTWARE\Microsoft\SMS\CurrentUser:
  UserSID : S-1-5-21-843997178-3776366836-1907643539-1105
  Session : 2

References