4 Kernel Exploits

Windows PrivEsc Methods

Family
Versions

Rogue Potato

Latest Version

SHOULD work on Windows 10

Juicy Potato

Upgrade of Rotten

Server 2008 R2 - No Hotfixes Windows 7 Enterprise 6.1.7600

Patched in Latest Win-10

Rotten Potato

Old

Year: 2016

Churrasco

Non-Potato

Chimichurri

Non-Potato : MS10-059

Basics

Required for Potato:

> whoami
Local Service

> whoami /priv
SeImpersonatePrivilege ..Enabled

Token Impersonations

Service Accounts Cant login with them, but can escalate them

Rogue Potato

Juicy Potato **BEST**

Juicy Potato + Powershell

Rotten Potato

Exploit from 2016 Service Accounts could get System tickets and Impersonate

churrasco

  • REF: GrannyHTB GrandpaHTB

  • Token impersonation via churrasco

  • To escalate privs to System - developed by Cesar Cerrudo.

  • Server 2003 allows Network Service and Local Service to impersonate 'System'

  • Patched by Microsoft in Windows 2012 (MS09-12).

  • On newer systems Juicy Potato works fine.

  • But on older systems, token impersonation is abused via the churrasco exploit.

  • If you have access to a box as nt authority\network service

  • IE: You managed to upload ASP.NET shell

  • You can easily elevate your privileges on the box.

  • You can download the exploit here and compile by yourself

  • or you can use the one from sqlninja which is located at /usr/share/sqlninja/apps/churrasco.exe

  • It’s used by sqlninja in cases when we bruteforced sa password.

  • After uploading you can easily

    • Elevate your privileges.

    • Create an Admin account

chimichurri

  • MS10-059

  • Server 2008 R2 Datacenter 6.1.7600 N/A Build 7600 No Patch 64bit

  • github/Re4son ..other blog:

MS11-046 (AFD PrivEsc)

  • The Ancillary Function Driver (AFD) in afd.sys does not properly validate user-mode input which allows local users to elevate privileges.

  • ms11-046.exe 6.1.7600 Build 7600 - for 32bit only

MS15-051

Send and Execute

Last updated

Was this helpful?