CcmPwn: leverages the CcmExec service to remotely hijack user sessions

CcmPwn

ccmpwn.py – lateral movement script that leverages the CcmExec service to remotely hijack user sessions.

Explanation

System Center Configuration Manager (SCCM) clients make use of the CcmExec service, which initiates the execution of C:\Windows\CCM\SCNotification.exe for every logged-in user. Leveraging the fact that SCNotification.exe is a .NET application, red team operators could modify its configuration file (C:\Windows\CCM\SCNotification.exe.config) to execute an AppDomainManager payload or coerce authentications as the affected users. This technique provides operators with an alternative approach to credential dumping or process injection. Operators must have local administrator privileges on the target system.

Read more about this technique and defense recommendations at SeeSeeYouExec: Windows Session Hijacking via CcmExec.

Install

git clone https://github.com/mandiant/ccmpwn.git

pip3 install impacket

Use

 

hijack user sessions

ccmpwn.py  can perform the following actions:

  • exec – execute an AppDomainManager payload for every logged-in user. Specify your -dll and malicious -config to upload to the target
  • coerce – coerce smb or http authentication for every logged-in user (-method). Specify computer for users to authenticate to -computer
  • query – query logged-in users via WMI
  • status – query CcmExec service status

Copyright (C) 2024 mandiant

Source: https://github.com/mandiant/