windows token exploits
Churrasco
REQUIREMENTS:
SeImpersonalPrivilege
Windows XP/VISTA/2003/2008, Win Server 2003
HotPotato
Windows 7,8,10, Server 2008, Server 2012
REQUIREMENTS:
SeImpersonatePrivilege
machine is < Windows 10 1809 < Windows Server 2019
Try:
{03ca98d6-ff5d-49b8-abc6-03dd84127020}
REQUIREMENTS:
SeImpersonatePrivilege
Win10, Server 2016, Server 2019
REQUIREMENTS:
SeImpersonatePrivilege
machine is >= Windows 10 1809 & Windows Server 2019
REQUIREMENTS:
Visual Studio to compile
Steps:
obtain user SID
Get-ADUser -Identity 'svc-print' | select SID
(New-Object System.Security.Principal.NTAccount("svc-print")).Translate([System.Security.Principal.SecurityIdentifier]).value
Clone Repo: tandasat/ExploitCapcom/
Generate
.exe
msfvenom reverse shellUpdate path to reverse shell on target line 410 in file
ExploitCapcom.cpp
Set for RELEASE
Build Solution
run
.\ExploitCapcom.exe
SeBackupPrivilege
Last updated