SCOM Enumeration LDAP Module#1230
Open
Ghost7926 wants to merge 3 commits into
Open
Conversation
Signed-off-by: Ryan Voit <93566632+Ghost7926@users.noreply.github.com>
Member
|
Very interesting, thanks for the PR! Haven't looked into that yet, will do when I got some time. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
This tool is a "netexec port" of the find function within SCOMHunter. This enumerates for specific SPNs utilized in SCOM to identify if it is used within the environment and/or configured in a vulnerable state.
This code was created while using Claude Sonnet with my direction of how the code will function and look. I reviewed each line for how it functions to ensure it operates how I've intended.
This code specifically searches for MSOMHSvc/* and MSOMSdkSvc/* SPNs. These SPNs are connected to the SCOM management server and SCOM Data Access Service account respectively. When these are on the same host, it opens up a relaying vulnerability for SCOM. Spector Ops Scommand and Conquer Part 1 blog outlines this. Additionally, I will be releasing a blog of my own that will thoroughly outline this attack.
References
https://specterops.io/blog/2025/12/10/scommand-and-conquer-attacking-system-center-operations-manager-part-1/
https://github.com/garrettfoster13/scomhunter
I am currently writting a blog and will publish it demonstrating this tool and this vulnerability.
Type of change
Insert an "x" inside the brackets for relevant items (do not delete options)
Setup guide for the review
No setup or alteration required, it is a simple ldap query and logic.
Screenshots (if appropriate):
I tried to model it off SCCM's output


Checklist:
Insert an "x" inside the brackets for completed and relevant items (do not delete options)
poetry run ruff check ., use--fixto automatically fix what it can)tests/e2e_commands.txtfile if necessary (new modules or features are required to be added to the e2e tests)