smb module performs comprehensive profiling of discovered SCCM infrastructure to determine site system roles and security configurations. This module builds upon the initial discovery from the find command to provide detailed operational intelligence.
The SMB profiling module checks multiple services (SMB, HTTP/HTTPS, MSSQL) and is particularly valuable for identifying PXE boot variables files that may contain Network Access Account credentials.
Profiling Components
The SMB module conducts reconnaissance across three main areas:1. Site Server Profiling
1. Site Server Profiling
Core Infrastructure Analysis
- Connectivity verification to discovered site servers
- MSSQL service detection for database hosting servers
- Site server state identification (Active vs Passive configuration)
- Central Administration Site (CAS) detection for hierarchy mapping
2. Management Point Validation
2. Management Point Validation
Client Communication Endpoints
- HTTP endpoint connectivity verification
- Management Point accessibility for client policy requests
- Service availability confirmation for exploitation planning
Management Points handle all client communications and are essential for HTTP-based attacks like client enrollment abuse.
3. Site System Role Detection
3. Site System Role Detection
Comprehensive Service Enumeration
- Site Code association from default file shares
- SMB signing status assessment (security configuration)
- Site system role identification including:
- Site Server
- Management Point
- Distribution Point (with PXE variables detection)
- SMS Provider
- MSSQL Server
- WSUS Server
Prerequisites
Requirements
- Valid Active Directory credentials (domain user minimum)
- Previous enumeration data from
findmodule - Network connectivity to target SCCM infrastructure
- SMB access to file shares (ports 139/445)
Command Syntax
Parameters
Required Parameters
Required Parameters
| Parameter | Description | Example |
|---|---|---|
-d | Target domain name | internal.lab |
-dc-ip | Domain controller IP or FQDN | 10.10.100.100 |
Authentication Options
Authentication Options
| Parameter | Description | Example |
|---|---|---|
-u | Username for authentication | administrator |
-p | Password for authentication | P@ssw0rd |
-hashes | NT:LM hash for authentication | aad3b435b51404ee:5fbc3d5fec8206a30f4b6c473d68ae76 |
-k | Use Kerberos authentication | |
-no-pass | Don’t prompt for password (useful with -k) | |
-aes | AES key for Kerberos (128 or 256 bits) |
Advanced Options
Advanced Options
| Parameter | Description | Example |
|---|---|---|
-ldaps | Use LDAPS instead of LDAP | |
-save | Automatically save PXE variables files | |
-debug | Enable verbose logging |
Usage Examples
Standard Infrastructure Profiling
Standard Infrastructure Profiling
Perform comprehensive profiling of discovered SCCM infrastructureExpected Output:
The SMB profiling provides three distinct tables: Site Servers (core infrastructure), Management Points (client endpoints), and a comprehensive Computers table with all role assignments.
PXE Variables Discovery and Auto-Save
PXE Variables Discovery and Auto-Save
Automatically download PXE boot variables files containing Network Access Account credentialsExpected Output:
Analysis and Interpretation
Understanding Site System Roles
The SMB profiling reveals the distributed nature of SCCM infrastructure:
- Site Servers: Core SCCM infrastructure hosting the site database
- Management Points: Client communication gateways for policy and software distribution
- Distribution Points: Content storage and PXE boot services
- SMS Providers: WMI providers for SCCM administration
- WSUS Integration: Windows Update Services integration points
Security Assessment Focus
Key Security Indicators:
- SMB signing disabled (attack opportunities)
- Active vs Passive configurations
- Central Administration Sites (highest privileges)
- Servers with multiple roles (broader attack surface)
Credential Discovery
PXE Variables Content:
- Network Access Account credentials
- Task sequence variables
- Domain join credentials
- Custom deployment secrets
Target Prioritization
High-Value Targets
High-Value Targets
- Central Administration Sites (CAS) - Top of hierarchy
- Active Site Servers with MSSQL - Database access
- Distribution Points with PXE - Credential exposure
- SMS Providers - Administrative access
Attack Path Planning
Attack Path Planning
- SMB Signing Disabled: NTLM relay opportunities
- Distribution Points: Network Access Account credential extraction
- Management Points: Client enrollment abuse for credential theft
- Site Servers: Database queries and privilege escalation