Skip to main content
SharpSCCM Banner

SharpSCCM: SCCM Security Assessment Toolkit

SharpSCCM is a powerful post-exploitation tool designed to leverage Microsoft System Center Configuration Manager (SCCM) / Microsoft Endpoint Configuration Manager for credential gathering, lateral movement, and privilege escalation without requiring access to the SCCM administration console GUI.
For Authorized Use Only: SharpSCCM is intended for authorized security testing, red team exercises, and defensive research. Always ensure you have proper authorization before using this tool.

What is SharpSCCM?

SharpSCCM exploits common SCCM misconfigurations and inherent design weaknesses to demonstrate the security risks associated with poorly configured SCCM environments. The tool operates from any Windows machine running the SCCM client software and leverages Windows Management Instrumentation (WMI) and the ConfigMgr Client Messaging SDK to communicate with SCCM infrastructure.
Research Foundation: This tool is built upon extensive security research by @_Mayyhem and incorporates techniques developed by the security community, including work by Matt Nelson, Adam Chester, Duane Michael, and Garrett Foster.

Core Capabilities

Extract sensitive credentials from SCCM infrastructure:
  • Network Access Accounts (NAAs): Retrieve domain credentials used for distribution point access
  • Collection Variables: Access credentials stored in collection-level variables
  • Task Sequence Credentials: Extract passwords from operating system deployment sequences
  • Policy Secret Decryption: Decrypt DPAPI-protected credential blobs
Move laterally through the environment using SCCM as a C2 framework:
  • Application Deployment: Execute commands on remote systems via application deployment
  • Script Execution: Run PowerShell scripts and binaries across collections
  • User Impersonation: Execute applications in specific user contexts
  • Collection Targeting: Target specific devices or users for operations
Force authentication for credential relay attacks:
  • Client Push Installation: Coerce NTLM authentication from site servers
  • WebClient Exploitation: Leverage WebClient for HTTP-based authentication
  • SMB Relay: Force connections to attacker-controlled SMB shares
  • Domain Controller Targeting: Relay authentication to domain controllers
Enumerate SCCM infrastructure and gather intelligence:
  • Site Discovery: Identify site servers and management points via LDAP
  • Admin Enumeration: List SCCM administrators and their roles
  • Device & User Discovery: Enumerate managed devices and users
  • Configuration Analysis: Analyze site settings and security configurations
Leverage the SCCM AdminService REST API for advanced operations:
  • CMPivot Queries: Execute arbitrary CMPivot queries for data collection
  • Real-time Intelligence: Gather system information from managed endpoints
  • Custom Queries: Run tailored queries for specific intelligence requirements
  • JSON Output: Retrieve structured data for further analysis

Attack Methodology

SharpSCCM follows a structured approach to SCCM exploitation:
1

Discovery & Reconnaissance

Identify SCCM infrastructure, site codes, management points, and site servers through LDAP queries and local client configuration analysis.
2

Credential Extraction

Extract stored credentials from policies, task sequences, and collection variables using DPAPI decryption techniques.
3

Privilege Escalation

Leverage extracted credentials or SCCM roles to gain higher privileges within the domain or SCCM hierarchy.
4

Lateral Movement

Use SCCM’s application deployment and script execution capabilities to move laterally across the network.
5

Persistence & Control

Establish persistence through SCCM configurations and maintain control over managed endpoints.

Key Features

No Console Required

Operates without needing access to the SCCM administration console GUI

Client-Side Execution

Runs from any Windows machine with the SCCM client installed

WMI Integration

Leverages WMI and ConfigMgr Client Messaging SDK for communication

Comprehensive Coverage

Addresses multiple attack vectors and SCCM security weaknesses

Prerequisites & Requirements

  • Environment
  • Permissions
  • Network Access
Minimum Requirements:
  • Windows machine with SCCM client installed
  • Domain-joined system (for most operations)
  • Network connectivity to SCCM management points
  • Local administrator privileges (for credential extraction)
Optimal Setup:
  • SCCM administrative access for full functionality
  • Valid domain credentials
  • PKI certificates (if site requires them)

Quick Start Guide

Command Categories

get Command Group - Extract information from SCCM infrastructure:
  • get site-info - Discover site servers and management points
  • get admins - Enumerate SCCM administrators
  • get devices - List managed devices and users
  • get collections - Discover device and user collections
  • get applications - View available applications
get secrets / local secrets - Extract stored credentials:
  • Network Access Account credentials
  • Collection variable passwords
  • Task sequence credentials
  • DPAPI-protected policy secrets
exec Command - Execute code on remote systems:
  • Application deployment for command execution
  • Script execution across collections
  • NTLM coercion and relay operations
  • User impersonation techniques
new / remove Commands - Modify SCCM infrastructure:
  • Create and delete applications
  • Manage collections and deployments
  • Add/remove collection members
  • Device registration operations
invoke Command Group - Advanced SCCM operations:
  • CMPivot query execution via AdminService
  • Client push authentication coercion
  • Policy update enforcement
  • Custom WQL query execution

Security Considerations

Important Security Notice: This tool can cause significant impact to production SCCM environments. Always test in isolated lab environments first and ensure you have proper authorization before use.

Responsible Use Guidelines

1

Authorization

Obtain explicit written authorization before testing against any SCCM infrastructure
2

Scope Limitation

Clearly define the scope of testing and avoid systems outside the authorized scope
3

Impact Assessment

Understand the potential impact of operations, especially application deployments
4

Documentation

Document all activities for compliance and remediation purposes
5

Cleanup

Remove any artifacts created during testing (applications, collections, etc.)

Defensive Recommendations

For comprehensive defensive guidance, see our Security Recommendations page, which covers:
  • SCCM hardening best practices
  • Detection and monitoring strategies
  • Incident response procedures
  • Security configuration checklists

Development & Lab Setup

Quick Lab Deployment: Microsoft’s Windows and Office 365 deployment lab kit can deploy a fully operational SCCM lab in Hyper-V in less than an hour.
Minimum Lab Components:
  • CM1: Configuration Manager Primary Site Server, Management Point, and Site Database Server
  • GW1: Configuration Manager Client
  • DC1: Domain Controller
Alternative Lab Options:

Research & Publications

Primary Research by @_Mayyhem: Black Hat USA Arsenal Presentations:

Community Research & Tools

Project Support & Contributors

Sponsorship: This project is supported by SpecterOps as part of their commitment to transparency and open-source security research.

Core Contributors

Community & Support