all InfoSec news
S4UTomato - Escalate Service Account To LocalSystem Via Kerberos
KitPloit - PenTest Tools! www.kitploit.com
Escalate Service Account To LocalSystem via Kerberos.
Traditional Potatoes
Friends familiar with the "Potato" series of privilege escalation should know that it can elevate service account privileges to local system privileges. The early exploitation techniques of "Potato" are almost identical: leveraging certain features of COM interfaces, deceiving the NT AUTHORITY\SYSTEM account to connect and authenticate to an attacker-controlled RPC server. Then, through a series of API calls, an intermediary (NTLM Relay) attack is executed during this authentication process, resulting in …
account authority elevate escalation exploitation features friends infosec kerberos local privilege privilege escalation privileges redteam series service shadow system system privileges techniques windows