Overview
Extract task sequence credentials from SCCM policies. Task sequences are automated workflows used for operating system deployment, software installation, and system configuration that often contain high-privilege domain credentials.Syntax
Parameters
Management point server address
The three-character site code (e.g., “PS1”)
Specific task sequence ID to target
Task sequence name pattern for filtering
SMS client GUID for authentication
Base64 certificate blob for client authentication
Save extracted credentials to file
Examples
Required Permissions
Local Administrator on SCCM client OR Computer account credentials OR Valid SCCM client certificate
Task Sequence Credentials
Domain Join Accounts
Domain Join Accounts
Purpose: Join systems to Active Directory domainCharacteristics:
- Often domain administrator accounts
- Required for automated OS deployment
- Used across all deployment scenarios
- High privilege and broad access
- Full domain administrator access
- Complete environment compromise
- Persistent access to all domain resources
Network Access Accounts
Network Access Accounts
Purpose: Access distribution points during deploymentCharacteristics:
- Domain accounts with network access
- Used when computer account auth fails
- Often over-privileged for convenience
- Shared across multiple deployments
- Network resource access
- Distribution point compromise
- Lateral movement opportunities
Application Installation Accounts
Application Installation Accounts
Purpose: Install software during deploymentCharacteristics:
- Service accounts with installation privileges
- Local or domain administrative rights
- Application-specific permissions
- Used for software deployment steps
- Administrative access to target systems
- Software installation and configuration
- System-level privilege escalation
Task Sequence Types
Operating System Deployment
Operating System Deployment
Windows Deployment:
- OS installation and configuration
- Driver installation and updates
- Application deployment and setup
- Domain join and configuration
- Domain join account (often domain admin)
- Network access account for content
- Application installation accounts
- System configuration credentials
Application Deployment
Application Deployment
Software Installation:
- Application installation workflows
- Configuration and customization
- License activation and setup
- Integration with existing systems
- Application-specific service accounts
- Database connection credentials
- Network service access accounts
- Administrative installation accounts
System Configuration
System Configuration
Configuration Management:
- System settings and policies
- Security configuration
- Network and service setup
- Compliance and hardening
- Administrative configuration accounts
- Service setup credentials
- Network configuration accounts
- Security policy implementation
Extraction Process
Task Sequence Discovery
Task Sequence Discovery
Policy Enumeration:
- Request machine policies from management point
- Identify task sequence policy objects
- Parse task sequence XML definitions
- Extract embedded credential references
- Locate credential objects within task sequences
- Decrypt encrypted credential values
- Extract plaintext usernames and passwords
- Map credentials to task sequence steps
Authentication Methods
Authentication Methods
Client Certificate:
- Use existing SCCM client certificate
- Access policies for current system
- Limited to assigned task sequences
- Register new device identity
- Access broader policy set
- Requires computer account credentials
- Use provided client certificate
- Impersonate existing SCCM client
- Access client-specific policies
Credential Analysis
High-Value Credentials
High-Value Credentials
Domain Administrator Accounts:Service Accounts:Network Access Accounts:
Credential Context
Credential Context
Task Sequence Steps:
- Map credentials to specific deployment steps
- Understand credential usage context
- Identify credential scope and purpose
- OS deployment vs application installation
- User-targeted vs system-targeted deployment
- Production vs testing environments
Attack Opportunities
Domain Compromise
Domain Compromise
Domain Administrator Access:
- Use extracted domain admin credentials
- Complete Active Directory compromise
- Full environment control and persistence
- Leverage high-privilege deployment accounts
- Escalate from user to domain admin
- Bypass security controls and restrictions
Infrastructure Access
Infrastructure Access
Distribution Point Access:
- Use network access accounts for lateral movement
- Access SCCM content repositories
- Pivot to additional network resources
- Leverage service account credentials
- Access application and database resources
- Exploit service account privileges
Output Format
Extracted task sequence credentials with context:Related Commands
get secrets- Comprehensive credential extractionget naa- Network Access Account extractionget collection-variables- Collection variable credentialslocal secrets- Local credential extraction