Overview
Request machine policies from management points to extract stored credentials including Network Access Accounts, collection variables, and task sequence passwords. This command leverages SCCM’s policy distribution mechanism to retrieve sensitive credentials.Syntax
Parameters
Management point server address
The three-character site code (e.g., “PS1”)
Register new device name for policy request
Computer account with trailing $ for device registration
Computer account password for device registration
Base64 certificate blob for client authentication
SMS client GUID for certificate authentication
Save policy XML to file for analysis
Authentication Methods
Local Client Certificate
Local Client Certificate
Prerequisites: Local Administrator on SCCM clientProcess:
- Uses existing SCCM client certificate
- Requests machine policy from management point
- Extracts credentials from policy response
- No additional credentials required
- Uses legitimate client identity
- Minimal audit trail
Device Registration
Device Registration
Prerequisites: Computer account credentialsProcess:
- Registers new device with SCCM using computer account
- Receives client certificate from management point
- Requests policy using new device identity
- Extracts credentials from policy
- Works from any system
- Creates legitimate device record
- Bypasses client installation requirements
Certificate Impersonation
Certificate Impersonation
Prerequisites: Existing SCCM client certificateProcess:
- Uses provided certificate for authentication
- Impersonates existing SCCM client
- Requests policy using certificate identity
- Reuses existing client certificates
- No device registration required
- Works with extracted certificates
Examples
Required Permissions
Local Administrator OR Computer account credentials OR Valid SCCM client certificate
Credential Types Extracted
Network Access Accounts (NAA)
Network Access Accounts (NAA)
Purpose: Domain accounts used for distribution point accessCharacteristics:
- Often have excessive domain privileges
- Frequently shared across environments
- Used when computer account authentication fails
- Critical for SCCM client operations
- High-value targets for lateral movement
- Often members of privileged groups
- May have admin rights on multiple systems
Collection Variables
Collection Variables
Purpose: Credentials stored in collection propertiesCharacteristics:
- Used for application deployment authentication
- Scoped to specific device/user collections
- May contain service account passwords
- Often overlooked in security reviews
- Application-specific credential exposure
- Potential service account compromise
- Collection-wide credential sharing
Task Sequence Credentials
Task Sequence Credentials
Purpose: Accounts used during OS deploymentCharacteristics:
- Often domain administrator accounts
- Used for domain join operations
- Required for automated deployments
- High privilege requirements
- Domain admin credential exposure
- Full domain compromise potential
- Automated deployment abuse
Technical Details
Policy Request Process
Policy Request Process
Policy Retrieval Steps:
- Client Authentication - Certificate or device registration
- Policy Request - HTTP(S) request to management point
- Policy Response - Encrypted policy XML containing secrets
- Credential Decryption - Extract plaintext credentials
Encryption and Security
Encryption and Security
Policy Protection:
- Policies are encrypted with client-specific keys
- Requires valid SCCM client identity for decryption
- HTTPS transport encryption (typically)
- Client certificate authentication
- Policy requests are logged on management points
- Device registration creates database entries
- Certificate usage may be audited
- Network traffic can be monitored
Output Format
Extracted credentials are displayed in structured format:Operational Security
Stealth Considerations
Stealth Considerations
Low-Profile Techniques:
- Use existing client certificates when possible
- Avoid device registration if not necessary
- Request policies during normal business hours
- Use legitimate-looking device names
Detection Avoidance
Detection Avoidance
Reduce Detection Risk:
- Limit policy request frequency
- Use existing management point connections
- Avoid unusual certificate patterns
- Clean up registered devices if needed
Common Issues
Authentication Failures
Authentication Failures
Error: Policy request denied or authentication failedSolutions:
- Verify management point address and site code
- Check computer account credentials
- Ensure certificate validity
- Verify network connectivity
No Secrets Found
No Secrets Found
Error: Policy received but no credentials extractedSolutions:
- Site may not use Network Access Accounts
- Enhanced HTTP may be enabled
- Collection variables may not be configured
- Task sequences may not contain credentials
Related Commands
local secrets- Extract credentials from local SCCM clientget naa- Alternative NAA extraction methodget collections- Identify collections with variableslocal site-info- Get management point information