Overview
Get policy secrets (e.g., network access accounts, task sequences, and collection variables) stored locally in the WMI repository. This command extracts and decrypts DPAPI-protected credentials from the local SCCM client.Syntax
local naa
Parameters
The method of obtaining the DPAPI-protected blobs:
wmi or disk- wmi: Extract from WMI repository namespace
- disk: Extract from OBJECTS.DATA file (can retrieve historic secrets)
Escalate to SYSTEM via token duplication (default modifies LSA secrets registry permissions)
Examples
Extraction Methods
WMI Method
WMI Method
Extracts secrets from the
root\ccm\policy\Machine\ActualConfig namespace:- Network Access Account credentials
- Task sequence variables
- Collection variables
- Currently active secrets only
Disk Method
Disk Method
Extracts secrets from the CIM repository
OBJECTS.DATA file:- All secrets including historic/deleted ones
- Network Access Accounts
- Task sequences with embedded credentials
- More comprehensive but requires file system access
Output Format
The command outputs discovered secrets in structured format:Types of Secrets Extracted
Network Access Accounts (NAA)
Network Access Accounts (NAA)
Domain accounts used by SCCM clients to access distribution points:
- Often over-privileged domain accounts
- Used when computer account cannot authenticate
- Critical for lateral movement and privilege escalation
Task Sequence Variables
Task Sequence Variables
Variables embedded in task sequences that may contain:
- Domain join credentials
- Service account passwords
- Application installation credentials
Collection Variables
Collection Variables
Variables assigned to device collections:
- Environment-specific credentials
- Application-specific secrets
- Configuration passwords
Security Implications
DPAPI Decryption Process
Key Extraction
Key Extraction
- DPAPI_SYSTEM Secret: Retrieved from LSA secrets
- Master Key Cache: Extracted for SYSTEM account
- Blob Decryption: DPAPI-protected blobs are decrypted
- Credential Parsing: Plain-text credentials are extracted
Privilege Requirements
Privilege Requirements
- Local Administrator: Required for registry access
- SYSTEM Token: Optional for enhanced access
- File System Access: Required for disk method
Common Use Cases
Credential Harvesting
Credential Harvesting
Extract NAA credentials for domain authentication and lateral movement.
Historical Analysis
Historical Analysis
Use disk method to recover deleted or changed credentials from the CIM repository.
Privilege Escalation
Privilege Escalation
Leverage discovered credentials for domain privilege escalation.
Mitigation Recommendations
Organizations should:
- Enable Enhanced HTTP to eliminate NAA requirements
- Use least privilege for any required NAAs
- Regular rotation of NAA passwords
- Monitor NAA usage for unauthorized access
Related Commands
get naa- Extract NAA from SCCM Management Pointlocal triage- Comprehensive local reconnaissancelocal site-info- Get site configuration details