Would you like a more focused section on or DPAPI decryption of stored credentials?
If you actually meant as in to provoke or encourage SCCM attacks — then the above serves as a technical deep-dive blueprint for offensive and defensive teams. goad sccm
: