RootSecRootSec
HomeAboutBlogToolsPublic Talks
RootSecRootSec
twittergithublinkedin
© 2026 RootSec
Penetration Tester · CHECK Team Member
RootSec

RootSec

Built on curiosity. Driven by compromise.

$ whoami

Jonathan — penetration tester specializing in web application security, phishing campaigns, and internal network testing.

Web AppsPhishingInternal TestingSAP SecurityRed Team
terminal — r00tsec@sh:~#
|
Recent Writingall posts →
Sep 30, 2025
SCCMActive DirectoryPenetration Testing

SCCM Exploitation: Part 3 - Reconnaissance and Enumeration

Recon from unauthenticated and authenticated angles using techniques and tools such as Nmap, RPC/IIS fingerprinting, LDAP/WMI to locate MPs/DPs and exposed package artifacts.

Sep 30, 2025
Aug 22, 2025
SCCMActive DirectoryPenetration Testing

SCCM Exploitation: Part 2 – Collections, Deployment, PXE

Exploring SCCM’s collections, variables, task sequences, network access accounts, and PXE boot to understand the in-depth process behind deployment and operating system provisioning.

Aug 22, 2025
Aug 12, 2025
SCCMActive DirectoryPenetration Testing

SCCM Exploitation: Part 1 - Background & Architecture

Breaking down and understanding Microsoft SCCM’s architecture, core components, different deployment models, and client installation methods before diving deeper into exploitation later.

Aug 12, 2025