Further reading
These aids for further study will let you dive deeper into the attacks covered in the chapter:
- I highly encourage you to read this blog post, as it has great insights into how the Remote Potato attack path was discovered and the general way of research thinking: https://www.sentinelone.com/labs/relaying-potatoes-another-unexpected-privilege-escalation-vulnerability-in-windows-rpc-protocol/.
- A good demonstration of the Remote Potato exploit in action: https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/
- Microsoft documentation about Group Policy structure: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-gpod/260b58dc-da14-400b-8b82-6abbfd529fbf
- Microsoft PowerShell GP-Link command reference: https://learn.microsoft.com/en-us/powershell/module/grouppolicy/new-gplink?view=windowsserver2022-ps