Escalating privileges via a Potato attack
In this section, we will be exploring the various tools and techniques that can be utilized to perform token impersonation via the Potato attack. As mentioned in the previous section, the success of Potato attacks will depend on the version of Windows the target is running and whether services such as WPAD are running or if NTLMv2 hashes are being used.
We can begin the process by following the outlined procedures:
- The first step involves performing system enumeration to identify any potential privilege escalation vectors that can be exploited through the Potato attack. This can be done using an automated enumeration script; in this case, we will utilize the Windows exploit suggester script:
./windows-exploit-suggester.py --database <Database>.xlsx --systeminfo <Systeminfo>.txt
As highlighted in the following screenshot, this will output a list of potential privilege escalation vulnerabilities, in this case, we are only...