4 Kernel Exploits
Windows PrivEsc Methods
Rogue Potato
Latest Version
SHOULD work on Windows 10
Juicy Potato
Upgrade of Rotten
Server 2008 R2 - No Hotfixes Windows 7 Enterprise 6.1.7600
Patched in Latest Win-10
Rotten Potato
Old
Year: 2016
Churrasco
Non-Potato
Chimichurri
Non-Potato : MS10-059
Basics
Required for Potato:
Token Impersonations
Service Accounts Cant login with them, but can escalate them
Rogue Potato
Juicy Potato **BEST**
Token Impersonation
http://ohpe.it/juicy-potato/CLSID (or powershell script)
Juicy Potato + Powershell
Reverse Shell with Admin
JP will use Elevated Powershell to grab/exe reverse-ps1-shell
REF: ArcticHTB
Rotten Potato
Exploit from 2016 Service Accounts could get System tickets and Impersonate
churrasco
REF: GrannyHTB GrandpaHTB
Token impersonation via churrasco
To escalate privs to System - developed by Cesar Cerrudo.
Server 2003 allows Network Service and Local Service to impersonate 'System'
Patched by Microsoft in Windows 2012 (MS09-12).
On newer systems Juicy Potato works fine.
But on older systems, token impersonation is abused via the churrasco exploit.
If you have access to a box as
nt authority\network service
IE: You managed to upload ASP.NET shell
You can easily elevate your privileges on the box.
You can download the exploit here and compile by yourself
or you can use the one from
sqlninja
which is located at/usr/share/sqlninja/apps/churrasco.exe
It’s used by
sqlninja
in cases when we bruteforcedsa
password.After uploading you can easily
Elevate your privileges.
Create an Admin account
chimichurri
MS10-059
Found with WindowsExploitSuggester
Server 2008 R2 Datacenter 6.1.7600 N/A Build 7600 No Patch 64bit
github/Re4son ..other blog:
MS11-046 (AFD PrivEsc)
The Ancillary Function Driver (AFD) in afd.sys does not properly validate user-mode input which allows local users to elevate privileges.
ms11-046.exe 6.1.7600 Build 7600 - for 32bit only
MS15-051
REF: DrupalPhpVuln
Send and Execute
Execute files from UNC shares
Ex: DrupalPhpVuln
Last updated