RootSecRootSec
HomeAboutBlogToolsPublic Talks
RootSecRootSec
twittergithublinkedin
© 2026 RootSec

Blog

3 posts · security research and write-ups

SCCM Exploitation: Part 3 -  Reconnaissance and Enumeration
new
SCCMMECM

SCCM Exploitation: Part 3 - Reconnaissance and Enumeration

Recon from unauthenticated and authenticated angles using techniques and tools such as Nmap, RPC/IIS fingerprinting, LDAP/WMI to locate MPs/DPs and exposed package artifacts.

Sep 30, 2025
15 min read
SCCM Exploitation: Part 2 – Collections, Deployment, PXE
SCCMMECM

SCCM Exploitation: Part 2 – Collections, Deployment, PXE

Exploring SCCM’s collections, variables, task sequences, network access accounts, and PXE boot to understand the in-depth process behind deployment and operating system provisioning.

Aug 22, 2025
18 min read
SCCM Exploitation: Part 1 - Background & Architecture
SCCMMECM

SCCM Exploitation: Part 1 - Background & Architecture

Breaking down and understanding Microsoft SCCM’s architecture, core components, different deployment models, and client installation methods before diving deeper into exploitation later.

Aug 12, 2025
10 min read