И ещё одна новая картошка! RasMan service for privilege escalation
https://github.com/crisprss/RasmanPotato
#git #lpe #soft #pentest #redteam
https://github.com/crisprss/RasmanPotato
#git #lpe #soft #pentest #redteam
GitHub
GitHub - crisprss/RasmanPotato: Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do
Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do - crisprss/RasmanPotato
И наконец опубликована картошка для CVE-2023-21746 (Windows LPE)
Blog: https://www.localpotato.com/localpotato_html/LocalPotato.html
PoC: https://github.com/decoder-it/LocalPotato
#git #lpe #pentest #redteam
Blog: https://www.localpotato.com/localpotato_html/LocalPotato.html
PoC: https://github.com/decoder-it/LocalPotato
#git #lpe #pentest #redteam
Localpotato
LocalPotato - When Swapping The Context Leads You To SYSTEM
Here we are again with our new *potato flavor, the LocalPotato! This was a cool finding so we decided to create this dedicated website ;)
Windows LPE via StorSvc service
PoC: https://github.com/blackarrowsec/redteam-research/tree/master/LPE%20via%20StorSvc
#lpe #pentest #redteam
PoC: https://github.com/blackarrowsec/redteam-research/tree/master/LPE%20via%20StorSvc
#lpe #pentest #redteam
GitHub
redteam-research/LPE via StorSvc at master · blackarrowsec/redteam-research
Collection of PoC and offensive techniques used by the BlackArrow Red Team - blackarrowsec/redteam-research
CVE-2023-21768: Windows 11 LPE
https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768
#exploit #lpe #redteam #pentest #git
https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768
#exploit #lpe #redteam #pentest #git
GitHub
GitHub - chompie1337/Windows_LPE_AFD_CVE-2023-21768: LPE exploit for CVE-2023-21768
LPE exploit for CVE-2023-21768. Contribute to chompie1337/Windows_LPE_AFD_CVE-2023-21768 development by creating an account on GitHub.
Local privilege escalation via PetitPotam (perfectly on Windows 21H2 10.0.20348.1547)
https://github.com/wh0amitz/PetitPotato
#lpe #pentest #redteam #git
https://github.com/wh0amitz/PetitPotato
#lpe #pentest #redteam #git
GitHub
GitHub - wh0amitz/PetitPotato: Local privilege escalation via PetitPotam (Abusing impersonate privileges).
Local privilege escalation via PetitPotam (Abusing impersonate privileges). - wh0amitz/PetitPotato
В семействе картошек пополнение - GodPotato. Windows LPE:
* Windows Server 2012 - Windows Server 2022 ;
* Windows8 - Windows 11
https://github.com/BeichenDream/GodPotato
#git #soft #lpe
* Windows Server 2012 - Windows Server 2022 ;
* Windows8 - Windows 11
https://github.com/BeichenDream/GodPotato
#git #soft #lpe
GitHub
GitHub - BeichenDream/GodPotato
Contribute to BeichenDream/GodPotato development by creating an account on GitHub.
Что тут у нас? Ой, очередное LPE😁
https://github.com/Dec0ne/DavRelayUp
#ad #redteam #pentest #lpe
https://github.com/Dec0ne/DavRelayUp
DavRelayUp - a universal no-fix LPE in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
#ad #redteam #pentest #lpe
А теперь к RedTeam😎 Повышение привилегий через сторонние инсталлеры это реально стреляющая техника. И мало того, что Mandiant описали это в своем блоге, так ещё и выпустили софт (BOF и Powershell версии) для поиска кэшированных MSI файлов.
Блог: https://www.mandiant.com/resources/blog/privileges-third-party-windows-installers
Софт: https://github.com/mandiant/msi-search
P.S.камон, ну какой нах powershell 😅
#redteam #bof #lpe
Блог: https://www.mandiant.com/resources/blog/privileges-third-party-windows-installers
Софт: https://github.com/mandiant/msi-search
P.S.
#redteam #bof #lpe
Bypassing UAC with SSPI Datagram Contexts
https://splintercod3.blogspot.com/p/bypassing-uac-with-sspi-datagram.html
#lpe #pentest #redteam #uac
https://splintercod3.blogspot.com/p/bypassing-uac-with-sspi-datagram.html
#lpe #pentest #redteam #uac
Forwarded from APT
🥔 Coerced Potato
New tool for local privilege escalation on a Windows machine, from a service account to NT SYSTEM. Should work on any recent versions of Windows.
⚙️ Tool:
https://github.com/hackvens/CoercedPotato
📝 Research:
https://blog.hackvens.fr/articles/CoercedPotato.html
#windows #lpe #seimpersonateprivilege #potato
New tool for local privilege escalation on a Windows machine, from a service account to NT SYSTEM. Should work on any recent versions of Windows.
⚙️ Tool:
https://github.com/hackvens/CoercedPotato
📝 Research:
https://blog.hackvens.fr/articles/CoercedPotato.html
#windows #lpe #seimpersonateprivilege #potato
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2023-36003 (Windows LPE XAML diagnostics API)
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
Исправлено в патче от 12 декабря
#lpe #ad #pentest #redteam
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
Исправлено в патче от 12 декабря
#lpe #ad #pentest #redteam
CVE-2024-20656: Windows LPE in the VSStandardCollectorService150 service
Blog: https://www.mdsec.co.uk/2024/01/cve-2024-20656-local-privilege-escalation-in-vsstandardcollectorservice150-service/
PoC: https://github.com/Wh04m1001/CVE-2024-20656
#lpe #exploit #redteam #pentest
Blog: https://www.mdsec.co.uk/2024/01/cve-2024-20656-local-privilege-escalation-in-vsstandardcollectorservice150-service/
PoC: https://github.com/Wh04m1001/CVE-2024-20656
#lpe #exploit #redteam #pentest
MDSec
CVE-2024-20656 - Local Privilege Escalation in the VSStandardCollectorService150 Service - MDSec
Overview Visual Studio is a complex and powerful IDE developed by Microsoft and comes with a lot of features that can be interesting from a red team perspective. During this...
CVE-2024-21338: Windows Admin-to-Kernel LPE
Уязвимы Windows 10 & 11
PoC: https://github.com/hakaioffsec/CVE-2024-21338
Blog: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
#lpe #windows #exploit #redteam
Уязвимы Windows 10 & 11
PoC: https://github.com/hakaioffsec/CVE-2024-21338
Blog: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
#lpe #windows #exploit #redteam