Summary
An attacker may use coercion methods to force the the SCCM site server’s client push installation accounts to authenticate to an attacker-controlled machine and relay that authentication to another target. This elevation method enables privilege escalation and lateral movement if the attacker targets other systems where the client push installation accounts have administrator privileges, as client push installation requires local administrator privileges to successfully install the client software. A defender can compare theAccount Name field of Event ID: 4624 to that of the Source_Host field, or the static IP address of the site server to the Source Network Address field. If the site server’s domain computer account generates a successful logon event from a source that is not that site server, an NTLM relay attack may have taken place.
The example below displays a successful logon event for a client push installation account from a host that is not the site server.
Linked Defensive IDs
- DETECT-1: Monitor site server domain computer accounts authenticating from another source
- PREVENT-5: Disable automatic side-wide client push installation
- PREVENT-12: Require SMB signing on site systems
Associated Offensive IDs
- ELEVATE-1: NTLM relay site server to SMB on site systems
- ELEVATE-2: NTLM relay via automatic client push installation
- ELEVATE-3: NTLM relay via automatic client push installation and AD System Discovery
References
- Chris Thompson, Coercing NTLM Authentication from SCCM Servers
- Daniel Petri, How to Defend Against an NTLM Relay Attack
- Fox-IT, Relaying credentials everywhere with ntlmrelayx