Garrett
@unsignedsh0rt.bsky.social
120 followers 62 following 10 posts
AdSim @ SpecterOps
Posts Media Videos Starter Packs
unsignedsh0rt.bsky.social
Had some fun with PDQ deploy/inventory credential decryption and wrote about it here: unsigned-sh0rt.net/posts/pdq_cr... thanks to
@dru1d.bsky.social for writing a BOF out of the POC

tl;dr get admin on PDQ box, decrypt privileged creds
Decrypting PDQ credentials | unsigned_sh0rt's blog
Walkthrough of how PDQ credentials encrypts service credentials
unsigned-sh0rt.net
Reposted by Garrett
specterops.io
#SCCM forest discovery accounts can be decrypted—even those for untrusted forests. If the site server is a managed client, all creds can be decrypted via Administration Service API.

Check out our latest blog post from @unsignedsh0rt.bsky.social to learn more. ghst.ly/4buoISp
Decrypting the Forest From the Trees - SpecterOps
TL;DR: SCCM forest discovery accounts can be decrypted including accounts used for managing untrusted forests. If the site server is a managed client, service account credentials can be decrypted via ...
ghst.ly
Reposted by Garrett
unsignedsh0rt.bsky.social
Claude.ai is so sick. I might actually fool people into believing I know how to code with this
Claude
Talk with Claude, an AI assistant from Anthropic
Claude.ai
unsignedsh0rt.bsky.social
It's not limited to just ADCLI either...ManageEngine is probably the most familiar or recognizable tool that does this. It's true microsoft fixed creating them in ADUC but hardly fixed things where third party tools are involved.
unsignedsh0rt.bsky.social
So what's happening? The tool before would create the computer object without a password and then set it to a default after the fact. Now, that password setting is blocked and the object persists...with no password.
unsignedsh0rt.bsky.social
But now, you get a failure as you cannot change the accounts password. However, it STILL creates the object.
unsignedsh0rt.bsky.social
I had a hunch though that behavior might not be true for third party tools and third-party tools were arguably the biggest cause of their existence across all the enviroments I've tested over the years. An example of this is the adcli command line tool. Before it would set with a default password.
unsignedsh0rt.bsky.social
Was doing some digging "What's New" in Server2025 learn.microsoft.com/en-us/window... specifically the changes to pre-2k machines. Oddvar and I had spoken previously about the changes being solid and demonstrated pre-created machines in ADUC could no longer be set with a default password.
unsignedsh0rt.bsky.social
Guess this is the place to be then