You must have heard about the recent Windows Privilege exploit codenamed "Hot Potato".
Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing.
Using this technique, we can elevate our privilege on a Windows workstation from the lowest levels to “NT AUTHORITY\SYSTEM” – the highest level of privilege available on a Windows machine.
I just thought if we could port it to post exploit for Windows to gain Admin privilege?
6986 (Hot Potato) was closed (not merged) and was later superseded by #10418 (Rotten Potato / Reflective Potato), which is soon likely to be deprecated by #11230 (Juicy Potato) pending merge.
You must have heard about the recent Windows Privilege exploit codenamed "Hot Potato".
Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing.
Using this technique, we can elevate our privilege on a Windows workstation from the lowest levels to “NT AUTHORITY\SYSTEM” – the highest level of privilege available on a Windows machine.
I just thought if we could port it to post exploit for Windows to gain Admin privilege?
Is it possible? Let me know.
Reference: https://code.google.com/p/google-security-research/issues/detail?id=222
Thanks