|
10554 | 10554 | }
|
10555 | 10555 | ]
|
10556 | 10556 | },
|
| 10557 | + "auxiliary_admin/sccm/get_naa_credentials": { |
| 10558 | + "name": "Get NAA Credentials", |
| 10559 | + "fullname": "auxiliary/admin/sccm/get_naa_credentials", |
| 10560 | + "aliases": [ |
| 10561 | + |
| 10562 | + ], |
| 10563 | + "rank": 300, |
| 10564 | + "disclosure_date": null, |
| 10565 | + "type": "auxiliary", |
| 10566 | + "author": [ |
| 10567 | + "xpn", |
| 10568 | + "skelsec", |
| 10569 | + "smashery" |
| 10570 | + ], |
| 10571 | + "description": "This module attempts to retrieve the Network Access Account(s), if configured, from the SCCM server.\n This requires a computer account, which can be added using the samr_account module.", |
| 10572 | + "references": [ |
| 10573 | + "URL-https://blog.xpnsec.com/unobfuscating-network-access-accounts/", |
| 10574 | + "URL-https://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/CRED/CRED-2/cred-2_description.md", |
| 10575 | + "URL-https://github.com/Mayyhem/SharpSCCM", |
| 10576 | + "URL-https://github.com/garrettfoster13/sccmhunter" |
| 10577 | + ], |
| 10578 | + "platform": "", |
| 10579 | + "arch": "", |
| 10580 | + "rport": 389, |
| 10581 | + "autofilter_ports": [ |
| 10582 | + 80, |
| 10583 | + 8080, |
| 10584 | + 443, |
| 10585 | + 8000, |
| 10586 | + 8888, |
| 10587 | + 8880, |
| 10588 | + 8008, |
| 10589 | + 3000, |
| 10590 | + 8443 |
| 10591 | + ], |
| 10592 | + "autofilter_services": [ |
| 10593 | + "http", |
| 10594 | + "https" |
| 10595 | + ], |
| 10596 | + "targets": null, |
| 10597 | + "mod_time": "2025-03-03 11:47:10 +0000", |
| 10598 | + "path": "/modules/auxiliary/admin/sccm/get_naa_credentials.rb", |
| 10599 | + "is_install_path": true, |
| 10600 | + "ref_name": "admin/sccm/get_naa_credentials", |
| 10601 | + "check": false, |
| 10602 | + "post_auth": true, |
| 10603 | + "default_credential": false, |
| 10604 | + "notes": { |
| 10605 | + "Stability": [ |
| 10606 | + |
| 10607 | + ], |
| 10608 | + "SideEffects": [ |
| 10609 | + "config-changes" |
| 10610 | + ], |
| 10611 | + "Reliability": [ |
| 10612 | + |
| 10613 | + ] |
| 10614 | + }, |
| 10615 | + "session_types": [ |
| 10616 | + "ldap" |
| 10617 | + ], |
| 10618 | + "needs_cleanup": false, |
| 10619 | + "actions": [ |
| 10620 | + |
| 10621 | + ] |
| 10622 | + }, |
10557 | 10623 | "auxiliary_admin/serverprotect/file": {
|
10558 | 10624 | "name": "TrendMicro ServerProtect File Access",
|
10559 | 10625 | "fullname": "auxiliary/admin/serverprotect/file",
|
|
24467 | 24533 | "name": "ENUM_PRE_WINDOWS_2000_COMPUTERS",
|
24468 | 24534 | "description": "Dump info about all computer objects likely created as a \"pre-Windows 2000 computer\", for which the password might be predictable."
|
24469 | 24535 | },
|
| 24536 | + { |
| 24537 | + "name": "ENUM_SCCM_MANAGEMENT_POINTS", |
| 24538 | + "description": "Find all registered SCCM/MECM management points" |
| 24539 | + }, |
24470 | 24540 | {
|
24471 | 24541 | "name": "ENUM_UNCONSTRAINED_DELEGATION",
|
24472 | 24542 | "description": "Dump info about all known objects that allow unconstrained delegation."
|
|
0 commit comments