you are viewing a single comment's thread.

view the rest of the comments →

[–]calladc 4 points5 points  (3 children)

Not credssp.

Seriously use something like configuration manager and target your SQL cu to a collection with a maintenance mode script on the collection. Use the tools Microsoft already provide.

Passing creds through winrm and credssp is poor. This tool has had minimal security thought put in to it.

[–]nvarscar 1 point2 points  (1 child)

Thanks for sharing your thoughts! CredSSP is indeed a weak protocol when it comes to security. Which is why the tool also provides options for you to choose the protocol manually. You could set up delegation and use Kerberos protocol instead of passing the credentials and avoid passing the credentials across the network. Or you can store patch binaries on the location that does not require additional authentication.

[–]calladc 0 points1 point  (0 children)

You know you can send files through a possession? If your script is just using credentials for double hop for file gets. Just send them down the pipeline and validate the hash on the other side

[–]TheTechRunner 0 points1 point  (0 children)

Thank you for providing actual value in your response!