4 Kernel Exploits
Windows PrivEsc Methods
Last updated
Windows PrivEsc Methods
Last updated
Family | Versions | |
---|---|---|
Service Accounts Cant login with them, but can escalate them
Token Impersonation
http://ohpe.it/juicy-potato/CLSID (or powershell script)
Reverse Shell with Admin
JP will use Elevated Powershell to grab/exe reverse-ps1-shell
REF: ArcticHTB
Exploit from 2016 Service Accounts could get System tickets and Impersonate
REF: GrannyHTB GrandpaHTB
Token impersonation via churrasco
To escalate privs to System - developed by Cesar Cerrudo.
Server 2003 allows Network Service and Local Service to impersonate 'System'
Patched by Microsoft in Windows 2012 (MS09-12).
On newer systems Juicy Potato works fine.
But on older systems, token impersonation is abused via the churrasco exploit.
If you have access to a box as nt authority\network service
IE: You managed to upload ASP.NET shell
You can easily elevate your privileges on the box.
You can download the exploit here and compile by yourself
or you can use the one from sqlninja
which is located at /usr/share/sqlninja/apps/churrasco.exe
It’s used by sqlninja
in cases when we bruteforced sa
password.
After uploading you can easily
Elevate your privileges.
Create an Admin account
MS10-059
Found with WindowsExploitSuggester
Server 2008 R2 Datacenter 6.1.7600 N/A Build 7600 No Patch 64bit
github/Re4son ..other blog:
The Ancillary Function Driver (AFD) in afd.sys does not properly validate user-mode input which allows local users to elevate privileges.
ms11-046.exe 6.1.7600 Build 7600 - for 32bit only
REF: DrupalPhpVuln
Execute files from UNC shares
Ex: DrupalPhpVuln
Rogue Potato
Latest Version
SHOULD work on Windows 10
Juicy Potato
Upgrade of Rotten
Server 2008 R2 - No Hotfixes Windows 7 Enterprise 6.1.7600
Patched in Latest Win-10
Rotten Potato
Old
Year: 2016
Churrasco
Non-Potato
Chimichurri
Non-Potato : MS10-059