Немного про релей с SCCM в MSSQL для получения учетных данных NAA и не только.
https://specterops.io/blog/2025/07/15/id-like-to-speak-to-your-manager-stealing-secrets-with-management-point-relays/
А обновление в SCCMHunter обещают после BlackHat в августе
#ad #sccm #pentest #redteam #relay
https://specterops.io/blog/2025/07/15/id-like-to-speak-to-your-manager-stealing-secrets-with-management-point-relays/
А обновление в SCCMHunter обещают после BlackHat в августе
#ad #sccm #pentest #redteam #relay
SpecterOps
I’d Like to Speak to Your Manager: Stealing Secrets with Management Point Relays - SpecterOps
Network Access Account, Task Sequence, and Collection Settings policies can be recovered from SCCM by relaying a remote management point site system to the site database server.
🔥12👍5😁1
CVE-2025-53770: SharePoint RCE (ToolShell)
Exploit: https://github.com/soltanali0/CVE-2025-53770-Exploit
Patched: July 20, 2025
#rce #pentest #redteam #ad #sharepoint #cve
Exploit: https://github.com/soltanali0/CVE-2025-53770-Exploit
Patched: July 20, 2025
#rce #pentest #redteam #ad #sharepoint #cve
GitHub
GitHub - soltanali0/CVE-2025-53770-Exploit: SharePoint WebPart Injection Exploit Tool
SharePoint WebPart Injection Exploit Tool. Contribute to soltanali0/CVE-2025-53770-Exploit development by creating an account on GitHub.
🔥9👍5😁2🤔2🎉1