Expand CRED-6 to cover credential exposure on other site server shares#51
Merged
Mayyhem merged 2 commits intosubat0mik:mainfrom Mar 30, 2026
Merged
Conversation
Broaden scope beyond SCCMContentLib$ to include other shares commonly found on SCCM site servers (temp directories, script staging folders, admin shares) that frequently contain hardcoded credentials. Added T1552.001 TTP for unsecured credentials in files.
Collaborator
|
Thanks for the PR @chryzsh ! Could you please add operational tradecraft (e.g., tooling, specific commands, etc.) to support the techniques you're suggesting we add, as well as corresponding defensive techniques? |
- Add smbclient.py example for enumerating non-default shares - Add real-life examples of credential exposure in non-standard shares - Cross-reference RECON-2 for identifying standard vs non-default SCCM shares
Contributor
Author
|
I added an operational tradecraft example, rewrote language to provide some examples and make it clearer. Defense here would mainly be to not expose non-default shares and to not put creds in files. As neither are SCCM specific, I'm not sure if they warrant a new defensive technique in this repo. I'm happy to add a suggestion for that if you do want it though. |
Mayyhem
approved these changes
Mar 30, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
After a brief discussion with @Mayyhem over DMs on the Bloodhound slack, I told him about how I've found SCCM Administrator creds on the SCCM share. I'm therefore proposing broadening the scope of CRED-6 beyond SCCMContentLib$ to include other shares commonly found on SCCM site servers (temp directories, script staging folders, admin shares) that frequently contain hardcoded credentials. Added T1552.001 TTP for unsecured credentials in files.
Let me know what you think.