| Live Webinar | Thursday, May 7, 2026 | 2pm EDT |
System Center Operations Manager (SCOM) environments are responsible for monitoring critical infrastructure yet introduce insecure defaults and an often-misconfigured attack surface within enterprise networks. This research exposes how SCOM's default configurations and architectural design choices create exploitable abuse paths that can lead to credential theft, lateral movement across monitored infrastructure, and ultimately, domain privilege escalation.
This presentation will detail techniques for extracting account credentials, spoofing client enrollment, abusing credential relaying, and manipulating role-based access controls to takeover SCOM. We hope to leave you with a better understanding of SCOM's internal security architecture and tangible defensive guidance for securing SCOM deployments.
Speakers:
Vivin Sathyan
Chief Technology Evangelist and Spokesperson, ManageEngine
Garrett Foster
Senior Security Researcher, SpecterOps, Inc
Matt Johnson
Training Architect, SpecterOps, Inc.
Terry Sweeney
Moderator, Black Hat
Offered Free by: ManageEngine
See All Resources from: ManageEngine
Thank you
This download should complete shortly. If the resource doesn't automatically download, please, click here.
Thank you
This download should complete shortly. If the resource doesn't automatically download, please, click here.





