RottenPotato
The info in this page info was extracted from this post
Service accounts usually have special privileges (SeImpersonatePrivileges) and this could be used to escalate privileges.
I won’t go into the details on how this exploit works, the article above explains it far better than I ever could.
Let’s check our privileges with meterpreter:
meterpreter > getprivs
Enabled Process Privileges
==========================
Name
----
SeAssignPrimaryTokenPrivilege
SeChangeNotifyPrivilege
SeCreateGlobalPrivilege
SeImpersonatePrivilege
SeIncreaseQuotaPrivilege
SeIncreaseWorkingSetPrivilegeExcellent, it looks like we have the privileges we need to perform the attack. Let’s upload rottenpotato.exe
Back on our meterpreter session we load the incognito extension.
We can see we currently have no Impersonation Tokens. Let’s run the Rotten Potato exploit.
We need to quickly impersonate the token or it will disappear.
Success! We have our SYSTEM shell and can grab the root.txt file!
Last updated