SeImpersonate and SeAssignPrimaryToken privilege
Exploit JuicyPotato
Debug programs right
PS C:\Users\Public> whoami /priv
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ========================================= ========
SeAssignPrimaryTokenPrivilege Replace a process level token Disabled
SeIncreaseQuotaPrivilege Adjust memory quotas for a process Disabled
SeAuditPrivilege Generate security audits Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
**SeImpersonatePrivilege** Impersonate a client after authentication Enabled
SeCreateGlobalPrivilege Create global objects Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
Connecting with MSSQLClient.py
Enabling xp_cmdshell
Confirming Access
Checking Account Privileges
Escalating Privileges Using JuicyPotato
Catching SYSTEM Shell
PrintSpoofer and RoguePotato
Escalating Privileges using PrintSpoofer
Catching Reverse Shell as SYSTEM
JuicyPotato
Last updated